A+1102 3.0 Software Troubleshooting Flashcards
A software engineer is troubleshooting a team laptop and discovers that several case management tools are out-of-date. What action should the engineer take to get the applications to the latest version?
YOU WERE SURE AND CORRECT
Update the application.
A cyber technician successfully captures the user profile for a computer that is demonstrating performance issues. The technician moves this profile onto a new computer for the employee’s use. What is this called?
YOU WERE SURE AND CORRECT
Reimage the device.
A cyber architect is reviewing a help ticket in which an employee is complaining that their computer halts during boot up or stops working in the middle of a session. When asked specifically what the computer was doing, the employee stated that the device simply stopped what it was doing and displayed a crash screen with a frowning face. What is the employee observing from the computer?
YOU WERE SURE AND CORRECT
Blue screen of death
A cyber technician is troubleshooting a company computer that exhibits performance issues. What steps should the technician take in their troubleshooting strategy? (Select all that apply.)
Check for misconfigurations.
Verify the problem.
Check for overheating.
A cyber intern needs to create a living record of tech complaints presented by the organization’s employees. The issue with the highest number of complaints is application crashes. What is unique to application crashes?
YOU WERE SURE AND CORRECT
It occurs when a program stops unexpectedly.
A software engineer is reviewing a help ticket where an employee can not access their account due to corrupted files but has to regain the data. What method allows the engineer to take uncorrupted data and place it in a new account for the employee?
YOU WERE SURE AND CORRECT
Rebuild a Windows profile.
A cyber architect is reviewing a ticketed computer and discovers that the newest driver is corrupted and wants to revert to a good driver. What can the architect do to complete this task?
THE CORRECT ANSWER
Roll back an update.
A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?
YOU WERE UNSURE AND CORRECT
Restart services.
An employee reports an issue in which they state they cannot print. The help desk technician discovers that the employee uses a peripheral hub with four additional devices connected via a single connector to the computer. What is causing the issue with the printer?
THE CORRECT ANSWER
USB controller resource warning
A technician receives a request from an employee via a help ticket. The employee wants to return their computer to a former installation setting. What is the employee requesting the technician to complete?
YOU WERE SURE AND CORRECT
Restore the computer.
A cyber engineer identifies a disk drive while working on a computer, but the loader does not reflect the location. What computer issue is the engineer observing in this instance?
YOU WERE SURE AND CORRECT
No OS found
An organizational employee is having computing issues while attempting to run several applications simultaneously. What is the employee experiencing in this instance?
YOU WERE SURE AND CORRECT
Low memory warning
A cyber architect troubleshoots a computer with the message that reflects “OS not found.” What recovery mode command prompts repair of the master boot record (MBR)?
YOU WERE SURE AND CORRECT
bootrec/fixmbr
A cyber architect wants to enhance their work computer for better optimization, storage space, and speed efficiency. What can the architect consider to meet the desired optimization outcome?
YOU WERE SURE AND CORRECT
Add resources.
A software engineer troubleshoots an “OS not found” issue on a company computer and wants to repair the boot sector. What recovery mode command prompt can the engineer use to accomplish this troubleshooting task?
YOU WERE SURE AND CORRECT
bootrec/fixboot
A cyber architect analyzes a computer returned for application and performance issues. As part of their analysis, the architect uses a utility that has a manual interface to review system files and restores stored files if found to be corrupt or damaged. What is the architect using to test files?
THE CORRECT ANSWER
SFC
A software engineer is experiencing issues with a work computer and identifies that the computer does not have the memory or video graphics necessary to operate the program. What should the engineering review to ensure the program works correctly?
THE CORRECT ANSWER
Verify requirements.
A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?
Restart services.
A cyber consultant reviews the help ticket log and notices several computers submitted for repairs due to being out of sync with other systems. What is the consultant observing in the log?
THE CORRECT ANSWER
Time drift
A technician is troubleshooting an organizational computer that is continually restarting without any action from the user. What is the computer doing?
YOU WERE SURE AND CORRECT
Rebooting
A maintenance engineer is troubleshooting a computer that is out of sync. What is the cause for the computer’s inability to sync?
THE CORRECT ANSWER
Time drift
A software engineer is reviewing the various concerns associated with certificate warnings. What are common issues tied to certificate warnings? (Select all that apply.)
It has expired or is listed as revoked.
It is self-signed or issued by a CA that is not trusted.
The FQDN requested by the browser is different from the subject name listed.
An employee works on their company computer and receives a push notification to download and install software to remain compliant. Upon clicking the link in the notification window, malware inserts into the device. What message did the employee receive?
THE CORRECT ANSWER
Desktop alert
A cyber architect reviews desktop symptoms and wants to learn more about file system errors and anomalous behaviors. Which are NOT considered symptoms of security issues in the file system? (Select all that apply.)
Certificate warnings
Desktop alerts
An employee is working on their company computer and begins getting pop-up notifications. Which notifications would be considered desktop alerts? (Select all that apply.)
Immediate download
Push notification
Software install and upgrade
A cyber associate reviews the company policy on troubleshooting desktop symptoms of malware infection. What is a key indicator that malware infection has occurred in security-related applications?
THE CORRECT ANSWER
OS update failure
An employee viewed websites to shop for company equipment and traversed to an unknown site. The employee recognizes that the site does not have a little padlock next to the web address and attempts to recall what that means. What is the premise of a certificate warning?
YOU WERE SURE AND CORRECT
It is a notification that a website may be untrustworthy and may pose an increased risk.
A technician reviews the CompTIA A+ manual regarding malware symptoms associated with performance issues. What is considered a performance symptom?
YOU WERE SURE AND CORRECT
The host cannot access the network or the network is slow.
A software engineer is having issues with one of the company laptops and believes it may have malware. What is a symptom that the device may have been affected by malware?
THE CORRECT ANSWER
The device is unable to access the network.
A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer’s file system?
THE CORRECT ANSWER
The file names of saved work changed.
An employee is receiving training on best practices associated with surfing the internet. What is common with frequent pop-ups?
THE CORRECT ANSWER
It occurs when advertisements or notifications appear on the display that were not wanted.
A cyber analyst is drafting a memorandum discussing the various messages a user can receive on their device. What type of message appears on the display of a device without the approval or desire from the user?
YOU WERE SURE AND CORRECT
Unwanted notifications
An engineer is reviewing the various symptoms associated with malware infections. What is NOT a symptom associated with security system errors?
THE CORRECT ANSWER
The host cannot access the network or network performance is slow.
An employee goes to several websites to purchase needed office equipment and new laptop computers. The employee selects a website that hosts laptop computers, but the page displays a site with inappropriate content. What has occurred in this situation?
YOU WERE SURE AND CORRECT
The user attempts to open one web page but is directed to another one.
A software engineer is having issues with one of the company laptops and believes it may have malware. What is a symptom that the device may have been affected by malware?
THE CORRECT ANSWER
The device is unable to access the network.
A new employee attempts to set up their new computer and activates some desktop alerts to assist in their day-to-day operations. Which is NOT a desktop alert?
YOU WERE SURE AND CORRECT
An advertisement offering items that were recently viewed by the user.
An employee becomes frustrated by the number of unsolicited instances the employee receives a notification. What is an unwanted operating system (OS) notification?
THE CORRECT ANSWER
It is a notification that appears on the display that was not prompted by the user.
An employee contacts the help ticket hotline complaining about frequent windows populating on their screen and the distraction it is taking from their work. What risks are associated with random pop-up windows?
YOU WERE SURE AND CORRECT
It can pose a risk of inadvertently adding malware to the device.
A technician is reviewing open-source literature on redirection. What type of malware exploits a target page to capture authentication details?
YOU WERE SURE AND CORRECT
Spyware
A cyber technician explores the various types of notifications that they can observe on the organization’s computers. What is unique to desktop alerts?
THE CORRECT ANSWER
It is a notification advising immediate action.
A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer’s file system?
YOU WERE SURE AND CORRECT
The file names of saved work changed.
A cyber consultant is reviewing the company’s policy on security issues. What are symptoms associated with security issues within file systems? (Select all that apply.)
The devices files have been renamed.
The device has altered system files.
An employee is working on a company computer and begins receiving several unusual antivirus warnings. What is important to know about false antivirus warnings?
YOU WERE SURE AND CORRECT
It is a notification that attempts to ruse the user into downloading nefarious content under false premises.
A cyber consultant troubleshoots a computer with anomalous errors and believes the issues originated from malware infection. What is a symptom of security issues associated with malware?
THE CORRECT ANSWER
The device has altered system files.
A technician uses the internet to purchase new computer components and is shopping for the best price. After reviewing several sites, the technician began receiving advertisements for related and unrelated products for the items they were looking for. What is the technician receiving?
YOU WERE SURE AND CORRECT
Frequent pop-ups
A cyber technician is drafting a memorandum to advise employees of current risks associated with using the internet. One of the topics in this memorandum focuses on site redirection. What type of malware has a blunt means of driving traffic through a site?
YOU WERE SURE AND CORRECT
Adware
A helpdesk ticket specialist uses CompTIA’s malware removal procedure while working on a company system. The specialist successfully runs scans and updates and begins preparing a document to educate end-point users. What step did the specialist omit from CompTIA’s best practice procedure?
THE CORRECT ANSWER
Sixth step
A software engineer is preparing a presentation regarding malware discovered on six company computers. Ensuring that the presentation was succinct but informative, the engineer used the best practice procedure for malware removal by CompTIA. What is the final step in CompTIA’s procedure?
THE CORRECT ANSWER
Educate the end-users.
A cyber analyst is attempting to remove malware from a company system and is following the steps of the CompTIA best practice procedure for malware removal. What step focuses on updating anti-malware software?
THE CORRECT ANSWER
Fourth step
A consultant is troubleshooting a system reported as being infected by malware. The office’s protocol is to follow the CompTIA best practice procedure. According to the procedure, what considerations should the consultant place while quarantining the infected system? (Select all that apply.)
Disconnect the network link.
Scan attached removable media devices for malware.
Move the infected system to a sandbox.
A specialist is developing a training exercise on malware removal and elects to use the CompTIA best practices procedure as the training model. While preparing notes for the training exercise, the specialist discusses quarantining infected systems and immediately transitions to remediating the infected systems. What step did the specialist overlook between these two steps?
THE CORRECT ANSWER
Third step
A help desk consultant removes malware from an employee’s computer and follows the CompTIA best practice procedure. The consultant has just completed the second step to quarantine infected systems. What should the consultant do for the next step?
THE CORRECT ANSWER
Disable system restore in Windows.
A cyber technician removes malware from the organization’s system and follows the guidance presented by CompTIA. While remediating the infected system, what should the technician be doing?
THE CORRECT ANSWER
Update the anti-malware software.
A technician attempts to remove malware while following the CompTIA best practices procedure. After investigating malware systems, what is the next step for the technician?
THE CORRECT ANSWER
Quarantine the infected systems.
A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)
Re-enable software firewalls.
Create a fresh restore point or system image.
Verify DNS configuration.
A technician reviews the best practice procedure that CompTIA created regarding malware removal. What step(s) are associated with remediating infected systems? (Select all that apply.)
THE CORRECT ANSWER
Update anti-malware software.
Use of scanning and removal techniques
A software consultant is tasked with malware removal for a company asset and reviews the best practices procedure from CompTIA. What step in the process uses scanning and removal techniques?
THE CORRECT ANSWER
Fourth step, part B
Upon remediating infected systems, the technician is ready to move to the next step of the CompTIA best practice procedure for malware removal. What is the next step in the CompTIA process?
THE CORRECT ANSWER
Schedule scans and updates.
A cyber consultant has disabled the system restore feature in Windows. According to the CompTIA best practice procedure for malware removal, what is the next step for malware removal?
THE CORRECT ANSWER
Remediate infected systems.
A cyber technician removes malware from the organization’s system and follows the guidance presented by CompTIA. While remediating the infected system, what should the technician be doing?
THE CORRECT ANSWER
Update the anti-malware software.
A technician is trying to troubleshoot a system impacted by malware. According to the CompTIA best practice procedure, what should also be done as a safety precaution when disabling system restore points?
THE CORRECT ANSWER
Delete old system restore points and backup copies.
A cyber architect is looking to remove malware from an employee’s computer, successfully quarantined the infected system, and disabled system restore. While following the CompTIA procedure for malware removal, what should the architect do as part of the remediation of infected systems?
THE CORRECT ANSWER
Conduct scanning and removal techniques.
A consultant is troubleshooting a system reported as being infected by malware. The office’s protocol is to follow the CompTIA best practice procedure. According to the procedure, what considerations should the consultant place while quarantining the infected system? (Select all that apply.)
Move the infected system to a sandbox.
Disconnect the network link.
Scan attached removable media devices for malware.
A technician reviews step 2 of the CompTIA best practice procedure for malware removal. While quarantining infected systems, what should the technician do first?
THE CORRECT ANSWER
Disconnect the network link.
While using the CompTIA best practice for malware removal, a consultant transitions from remediating infected systems to re-enabling system restore points in Windows. What step did the consultant skip?
THE CORRECT ANSWER
Fifth step
A cyber architect is working on removing malware from a corporate computer and elects to review the CompTIA seven-step best practice procedure for malware removal to develop a standard operating procedure for the cyber office. What is the first step of the best practice procedure?
THE CORRECT ANSWER
Investigate and verify malware symptoms.
A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)
Verify DNS configuration.
Re-enable software firewalls.
Create a fresh restore point or system image.
A technician attempts to remove malware while following the CompTIA best practices procedure. After investigating malware systems, what is the next step for the technician?
THE CORRECT ANSWER
Quarantine the infected systems.
A cyber analyst is attempting to remove malware from a company system and is following the steps of the CompTIA best practice procedure for malware removal. What step focuses on updating anti-malware software?
THE CORRECT ANSWER
Fourth step
A specialist is developing a training exercise on malware removal and elects to use the CompTIA best practices procedure as the training model. While preparing notes for the training exercise, the specialist discusses quarantining infected systems and immediately transitions to remediating the infected systems. What step did the specialist overlook between these two steps?
THE CORRECT ANSWER
Third step
Upon remediating infected systems, the technician is ready to move to the next step of the CompTIA best practice procedure for malware removal. What is the next step in the CompTIA process?
THE CORRECT ANSWER
Schedule scans and updates.
A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)
Create a fresh restore point or system image.
Verify DNS configuration.
Re-enable software firewalls.
A technician reviews step 2 of the CompTIA best practice procedure for malware removal. While quarantining infected systems, what should the technician do first?
THE CORRECT ANSWER
Disconnect the network link.
A cyber technician follows the CompTIA best practice procedure on malware removal and is ready to remediate one of the company’s infected systems. What tools are synonymous in remediating infected systems? (Select all that apply.)
Antivirus software
Anti-malware software
A help desk consultant removes malware from an employee’s computer and follows the CompTIA best practice procedure. The consultant has just completed the second step to quarantine infected systems. What should the consultant do for the next step?
THE CORRECT ANSWER
Disable system restore in Windows.
A cyber consultant has disabled the system restore feature in Windows. According to the CompTIA best practice procedure for malware removal, what is the next step for malware removal?
THE CORRECT ANSWER
Remediate infected systems.
A technician reviews the best practice procedure that CompTIA created regarding malware removal. What step(s) are associated with remediating infected systems? (Select all that apply.)
Update anti-malware software.
Use of scanning and removal techniques
A cyber technician follows the CompTIA best practice procedure on malware removal and is ready to remediate one of the company’s infected systems. What tools are synonymous in remediating infected systems? (Select all that apply.)
Anti-malware software
Antivirus software
A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)
A cyber technician removes malware from the organization’s system and follows the guidance presented by CompTIA. While remediating the infected system, what should the technician be doing?
THE CORRECT ANSWER
Update the anti-malware software.
A helpdesk technician reviews the CompTIA best practice guide regarding malware removal as they are putting together a presentation for the businesses’ cyber department. What is associated with remediating infected systems?
THE CORRECT ANSWER
Use of scanning and removal techniques.
A software agent has completed the fifth step of CompTIA’s best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.)
Create a fresh restore point or system image.
Verify DNS configuration.
Re-enable software firewalls.
A technician is working on removing malware from a company system. While following the steps presented in CompTIA’s best practice procedure for malware removal, the technician moves from investigating and verifying malware symptoms to disabling system restore points in Windows. What step did the technician skip in this scenario?
THE CORRECT ANSWER
Second step
A cyber architect is removing malware per CompTIA’s best practice procedure. Upon re-enabling system restore points in Windows, the architect closes the ticket and considers the task complete. What did the architect fail to complete?
THE CORRECT ANSWER
Seventh step
A software technician is reviewing CompTIA’s best practice procedure for malware removal. What step investigates and verifies malware symptoms?
THE CORRECT ANSWER
First step
A helpdesk technician is troubleshooting a device failing to update the operating system (OS). Which is NOT a step that the technician could use to update the OS?
THE CORRECT ANSWER
Check to ensure the Bluetooth is enabled for a communication link.
An employee is trying to purchase a USB device from the help ticket center and is getting frustrated as they have issues with the NFC feature on the phone. What should the employee consider as a means to troubleshoot the NFC issue? (Select all that apply.)
The device is unlocked and NFC is enabled
The NFC sensor is supported and enabled in the wallet app.
The device is not in airplane mode.
A help ticket consultant completes the troubleshooting methods prescribed by CompTIA for a device that the user is saying will not auto-rotate from vertical to horizontal viewing. The consultant has completed steps one and two and is moving to the final step. What is the final step in CompTIA’s troubleshooting for devices that fail to auto-rotate?
THE CORRECT ANSWER
Consider that some apps can only be used in a single orientation.
A cyber consultant is troubleshooting a mobile device that is having application issues. The consultant opens an application and cannot get it to stop. What is the consultant observing?
THE CORRECT ANSWER
Fails to close.
A technician is troubleshooting an employee’s company mobile device where the employee is complaining that several of the applications are failing to close. What causes a failure to close?
THE CORRECT ANSWER
It occurs when the application fails to stop after being prompted.
A cyber intern is troubleshooting connectivity issues associated with a mobile device’s inability to connect to the Wi-Fi. What can cause this type of issue?
THE CORRECT ANSWER
It occurs when the device is outside the range of the router.
A cyber consultant is troubleshooting a mobile device that is having application issues. The consultant identifies an outdated patch, but the consultant cannot get it installed. What is the consultant observing?
THE CORRECT ANSWER
Fails to update.
A cyber technician prepares a briefing on troubleshooting devices with operating system issues. What common issue can impact OS updates, cause the device to reboot randomly, or present a slow response?
THE CORRECT ANSWER
Battery issues
A cyber consultant is troubleshooting a mobile device that is having application issues. The technician opens an application and notices that it takes 25 seconds to load. What is the consultant observing?
THE CORRECT ANSWER
Slow to respond.
A technician is troubleshooting a mobile device where the employee complains that the device will not auto-rotate from vertical to horizontal viewing. From a CompTIA perspective, what is the first step to consider in remedying this situation?
Use the notification drawer or Control Center to check that rotation lock is not enabled.
A technician is troubleshooting connectivity issues on a mobile device regarding Bluetooth connections. What best describes Bluetooth connectivity?
THE CORRECT ANSWER
It occurs when paired devices are not in range.
A help ticket consultant completes the troubleshooting methods prescribed by CompTIA for a device that the user is saying will not auto-rotate from vertical to horizontal viewing. The consultant has completed steps one and two and is moving to the final step. What is the final step in CompTIA’s troubleshooting for devices that fail to auto-rotate?
THE CORRECT ANSWER
Consider that some apps can only be used in a single orientation.
A cyber consultant troubleshoots a mobile device that has application issues. The consultant is pressing on an icon for execution, but nothing is happening. What is the consultant observing?
THE CORRECT ANSWER
Fails to launch.
A cyber technician prepares a briefing on troubleshooting devices with operating system issues. What common issue can impact OS updates, cause the device to reboot randomly, or present a slow response?
THE CORRECT ANSWER
Battery issues
A consultant is troubleshooting an employee’s mobile device where the employee is complaining that several of the applications are failing to update. What causes a failure in updates?
THE CORRECT ANSWER
It occurs when the application fails to stop after being prompted.
A cyber consultant is troubleshooting a mobile device that is having application issues. The technician opens an application and notices that it takes 25 seconds to load. What is the consultant observing?
THE CORRECT ANSWER
Slow to respond.
A consultant is troubleshooting an employee’s mobile device where the employee is complaining that several of the applications are failing to update. What causes a failure in updates?
THE CORRECT ANSWER
It occurs when the system does not accept the latest version/patch.
A helpdesk technician receives a computer in their triage department where the customer is complaining that their device is constantly rebooting at random times. What could be causing the random reboots? (Select all that apply.)
The device has a low battery charge.
The device has a faulty battery or other hardware.
The device is overheating.
A cyber engineer is troubleshooting a device failing to update the OS. What steps can the engineer consider while troubleshooting the device? (Select all that apply.)
Restart the device and then try the update again.
Check that there is sufficient free space on the device.
Use the vendor site to verify that the update is compatible with the device model.
A cyber technician prepares a briefing on troubleshooting devices with operating system issues. What common issue can impact OS updates, cause the device to reboot randomly, or present a slow response?
THE CORRECT ANSWER
Battery issues
A software engineer troubleshoots an employee’s mobile device, complaining that the screen will not auto-rotate. The engineer has completed the first step prescribed by CompTIA to correct the issue and is moving to the next step. What is the second step in CompTIA’s recommendations for troubleshooting auto-rotate issues?
Check that the user is not touching any part of the screen as this will prevent rotation.
A software custodian is troubleshooting an employee’s mobile device. What type of issue occurs when a file transfer between iOS and macOS devices is not permitted because the recipient is not on the contact list?
THE CORRECT ANSWER
AirDrop
A helpdesk technician is troubleshooting a device failing to update the operating system (OS). Which is NOT a step that the technician could use to update the OS?
THE CORRECT ANSWER
Check to ensure the Bluetooth is enabled for a communication link.
A technician is troubleshooting connectivity issues on a mobile device where the employee is complaining that they can not complete near-field communication (NFC). How can an NFC issue be described?
THE CORRECT ANSWER
It occurs when a device cannot make payments through a contactless card reader.
A technician is troubleshooting a mobile device where the employee complains that the device will not auto-rotate from vertical to horizontal viewing. From a CompTIA perspective, what is the first step to consider in remedying this situation?
Use the notification drawer or Control Center to check that rotation lock is not enabled.
An employee wants to install an external program/application on their company computer that will support their current project. The employee uses a third-party website and believes that the install location is legitimate. Shortly after installing the software, the employee’s computer begins demonstrating symptoms associated with malware. What is the cause of the malware’s introduction to the company device?
THE CORRECT ANSWER
Spoof
A cyber consultant reviews the company’s policy on managing root access security concerns and mobile-device management suites. What makes advanced configuration settings and diagnostic/log data available?
THE CORRECT ANSWER
Developer mode
A cyber intern starts their first day and wants to read the latest organizational announcement, including a discussion on spoofing. What is a tenet of spoofing?
THE CORRECT ANSWER
It typically masquerades as a legitimate application.
A helpdesk consultant is reviewing the impacts of malware on mobile and computer assets. What can signify that malware is causing excessive power drain and high resource utilization and cause other apps to perform slowly?
THE CORRECT ANSWER
Data-usage limit notifications
An employee is working from their desk, and the computer display becomes filled with advertisements. What risk can be associated with a large numbers of ads?
THE CORRECT ANSWER
It can be part of an attempt to gain revenue but can pose increased risks to malware and other viruses.
A software technician is preparing a presentation on the “jailbreaking” of company assets. What does “jailbreaking” allow on a device?
THE CORRECT ANSWER
It enables users to obtain root privileges, sideload applications, and customize interfaces.
A cyber engineer creates a training packet on what employees should look for regarding leaked personal and corporate files. What proactive measures should the employees and engineer look for regarding this topic? (Select all that apply.)
Websites should be set for immediate notification.
Two-step verification should be monitored.
Linked devices to the data should be quarantined.
An employee visits the cyber help ticket office requesting the technician obtain root privileges, sideload apps, and customize the device’s interface. What term is associated with this type of action?
THE CORRECT ANSWER
Jailbreak
A helpdesk consultant is reviewing the impacts of malware on mobile and computer assets. What can signify that malware is causing excessive power drain and high resource utilization and cause other apps to perform slowly?
THE CORRECT ANSWER
Data-usage limit notifications
A cyber engineer creates a training packet on what employees should look for regarding leaked personal and corporate files. What proactive measures should the employees and engineer look for regarding this topic? (Select all that apply.)
Websites should be set for immediate notification.
Two-step verification should be monitored.
Linked devices to the data should be quarantined.
A cyber intern starts their first day and wants to read the latest organizational announcement, including a discussion on spoofing. What is a tenet of spoofing?
THE CORRECT ANSWER
It typically masquerades as a legitimate application.
An employee downloads and installs an application from an untrusted third-party developer using the .apk format. What is this called?
THE CORRECT ANSWER
Android package source
A cyber architect is writing a memorandum on the mobile security symptoms associated with malware. What should the architect include as part of these symptoms? (Select all that apply.)
Fake security warnings
Sluggish response time
High number of ads
A software technician is troubleshooting a mobile device that is exhibiting security concerns. What symptom presents risks associated with corruption to the domain name system and degraded communications between devices and sites?
THE CORRECT ANSWER
Limited internet connectivity
A company employee is working on their business computer and receives a message on their display advising that if they do not immediately install the application provided in the security message, their computer will shut down and lose all data. Out of concern, the employee downloads the software and is later a victim of the malware. What did the employee receive?
THE CORRECT ANSWER
Fake security warnings
An employee takes their company computer into the help ticket office complaining that the computer is not working correctly. The help ticket staff member identifies that the employee is attempting to run applications with requirements that exceed the company computer’s capabilities. What is the employee experiencing when attempting to run these programs?
THE CORRECT ANSWER
Sluggish response time
A software technician is preparing a presentation on the “jailbreaking” of company assets. What does “jailbreaking” allow on a device?
THE CORRECT ANSWER
It enables users to obtain root privileges, sideload applications, and customize interfaces.
A company employee is working on their business computer and receives a message on their display advising that if they do not immediately install the application provided in the security message, their computer will shut down and lose all data. Out of concern, the employee downloads the software and is later a victim of the malware. What did the employee receive?
THE CORRECT ANSWER
Fake security warnings
After an employee goes to the help desk and requests to “jailbreak” their company phone, the help desk sends out information to all employees discussing the risks of “jailbreaking” devices. What are the tenets of “jailbreaking”? (Select all that apply.)
It involves subverting the security controls built into the OS to gain unrestricted system-level access.
It can no longer be assumed to run a trusted OS.
It has the side effect of leaving many security measures permanently disabled.
A software engineer is working on a computer where the employee states that the application works correctly but continually displays a message prompt asking the user to grant access to the computer’s camera for program operations. The employee does not understand why they are receiving the messages as the program does not require a camera. What type of activity is the employee describing?
THE CORRECT ANSWER
Unexpected application behavior
A cyber engineer creates a training packet on what employees should look for regarding leaked personal and corporate files. What proactive measures should the employees and engineer look for regarding this topic? (Select all that apply.)
Websites should be set for immediate notification.
Linked devices to the data should be quarantined.
Two-step verification should be monitored.
A cyber intern starts their first day and wants to read the latest organizational announcement, including a discussion on spoofing. What is a tenet of spoofing?
THE CORRECT ANSWER
It typically masquerades as a legitimate application.
A cyber architect is writing a memorandum on the mobile security symptoms associated with malware. What should the architect include as part of these symptoms? (Select all that apply.)
High number of ads
Sluggish response time
Fake security warnings
An employee takes their company computer into the help ticket office complaining that the computer is not working correctly. The help ticket staff member identifies that the employee is attempting to run applications with requirements that exceed the company computer’s capabilities. What is the employee experiencing when attempting to run these programs?
THE CORRECT ANSWER
Sluggish response time
A cyber architect is writing a memorandum on the mobile security symptoms associated with malware. What should the architect include as part of these symptoms? (Select all that apply.)
High number of ads
Fake security warnings
Sluggish response time
A software engineer is working on a computer where the employee states that the application works correctly but continually displays a message prompt asking the user to grant access to the computer’s camera for program operations. The employee does not understand why they are receiving the messages as the program does not require a camera. What type of activity is the employee describing?
THE CORRECT ANSWER
Unexpected application behavior
An employee wants to download and install applications using an android package source. What does this type of sourcing allow?
THE CORRECT ANSWER
It allows applications to be downloaded and installed from untrusted external third-party sources.
A cyber specialist troubleshoots a mobile device showing limited internet connectivity to websites. What can cause this decrease in connectivity?
THE CORRECT ANSWER
Malware may be corrupting the domain name system.
A technician conducts a mobile security analysis on a set of work phones and identifies that one of them shows symptoms of malware. What results from malware disrupting connection with legitimate sites causing no traffic to exchange?
THE CORRECT ANSWER
No internet connectivity
An employee takes their company computer into the help ticket office complaining that the computer is not working correctly. The help ticket staff member identifies that the employee is attempting to run applications with requirements that exceed the company computer’s capabilities. What is the employee experiencing when attempting to run these programs?
THE CORRECT ANSWER
Sluggish response time
A cyber consultant reviews the company’s policy on managing root access security concerns and mobile-device management suites. What makes advanced configuration settings and diagnostic/log data available?
THE CORRECT ANSWER
Developer mode
An employee is working from their desk, and the computer display becomes filled with advertisements. What risk can be associated with a large numbers of ads?
THE CORRECT ANSWER
It can be part of an attempt to gain revenue but can pose increased risks to malware and other viruses.
An employee downloads and installs an application from an untrusted third-party developer using the .apk format. What is this called?
THE CORRECT ANSWER
Android package source
A cyber architect is writing a paper on root activity security concerns and the use of developer mode. What are the characteristics of placing a device into developer mode? (Select all that apply.)
It should be used only for application development.
It can be purposely misused to install bootleg applications.
It makes advanced configuration settings and log data available.
A cyber consultant reviews the company’s policy on managing root access security concerns and mobile-device management suites. What makes advanced configuration settings and diagnostic/log data available?
YOU WERE SURE AND CORRECT
Developer mode
A software technician is conducting an after-action report on an issue where someone leaked company information outside of the organization. What data can the technician pull to possibly identify the employee who sent the documentation outside the company?
THE CORRECT ANSWER
High network traffic