Chapt 19 Flashcards
In Windows, which utility is responsible for finding, downloading, and installing Windows patches?
A) Device Manager
B) Microsoft Management Console
C) Download Manager
D) Windows Update
Windows Update
D. Windows Update is responsible for downloading and installing Windows service packs, patches, and security updates. Device Manager is used to view devices installed on the operating system. The Microsoft Management Console is a console that allows snap‐ins to be added for management. Download Manager is a component of Internet Explorer.
Which Startup Setting option allows you to boot with basic drivers?
A) Enable Debugging
B) Enable Safe Boot
C) Disable Driver Signature Enforcement
D) Enable Low‐Resolution Video
Enable Safe Boot
B. Enable Safe Boot with the msconfig utility allows you to boot with basic drivers and minimal startup of nonessential services. Enable Debugging is used by kernel developers. Disable Driver Signature Enforcement is used to allow an unsigned driver to load during boot. Enable Low‐Resolution Video will boot the operating system into a VGA mode.
Which bootrec option can be used in Windows to rebuild the boot configuration file?
A) /fixboot
B) /rebuildbcd
C) /scanos
D) /fixmbr
/rebuildbcd
B. The /REBUILDBCD option can be used with the bootrec tool to rebuild the boot configuration data (BCD). The /FIXBOOT option writes a new boot sector to the system partition. The /SCANOS option scans all other partitions that are found to have Windows installations. The /FIXMBR writes a new master boot record (MBR) to the partition.
What is the first step in malware removal?
A) Quarantine the infected system.
B) Identify and verify the malware symptoms.
C) Remediate the infected system.
D) Educate the end user.
Identify and verify the malware symptoms.
B. The most important first step is to identify and verify the malware symptoms. You should quarantine the infected system once you have verified it is infected. Remediating the infected system happens after you disable System Restore. Education of the end user is the last step to malware removal.
Which tool will allow you to troubleshoot a slow‐loading profile?
A) Profile tab of the Advanced System Properties
B) Regedit
C) Windows Recovery Environment
D) Windows Preinstallation Environment
Profile tab of the Advanced System Properties
A. The Profile tab of the Advanced Systems Properties dialog box allows you to view the total size of a local or remote profile. Regedit and the Windows Recovery Environment will not aid in troubleshooting a slow‐loading profile. Windows Preinstallation Environment is the mini‐Windows version used for installation of Windows.
Which of the following components are only used to restore Windows from a suspended state?
A) BCD
B) ntoskrnl.exe
C) winload.exe
D) winresume.exe
winresume.exe
D. winresume.exe is used to load Windows from a suspended state. The Boot Configuration Data (BCD) is used to direct Windows to boot the proper installation. ntoskrnl.exe is the Windows kernel. winload.exe is used for the normal booting of the Windows operating system.
One of the users you support has a Windows 10/11 laptop that will not boot up. The user just installed brand‐new drivers for a graphics card. They need to access a tax application and their data files. What should you try first?
A) Use System Restore.
B) Use Reset This PC.
C) Reimage the laptop.
D) Manually reinstall Windows 10
Use System Restore.
A. The System Restore option should be used first to restore the operating system to an earlier point before the problem. This will restore the device back to a previous state before the installation of the drivers. System Restore will not affect user data files. Reset This PC will reset the PC back to factory default before the tax application was installed. Reimaging the laptop will erase all programs and data files. Manually reinstalling Windows 10 will erase all programs and data files.
Which partitioning type is required when you have UEFI firmware?
A) GPT
B) MBR
C) POST
D) Boot Sector
GPT
A. When you have UEFI firmware, you must have the disk set up with a GUID Partition Table (GPT) partitioning type. The standard master boot record (MBR) partitioning type can be used with BIOS. Power‐on self‐test (POST) is a routine the BIOS or firmware performs to test hardware before boot. The Boot Sector is contained on both MBR and GPT partitioning types.
Which of the following are used to prevent pop‐unders from appearing?
A) Antimalware utilities
B) Pop‐up blockers
C) Phishing sites
D) Antivirus software
Pop‐up blockers
B. Pop‐up blockers are used to prevent pop‐ups and pop‐unders from appearing. Antimalware utilities will remove and prevent malware. Phishing sites are used to collect users’ credentials by tricking users. Antivirus software is used to protect the operating system from viruses.
In general, how often should you update your antivirus definitions?
A) Weekly
B) Monthly
C) Daily
D) Antivirus definitions do not need to be updated.
Daily
C. Antivirus definitions should be updated daily, because new viruses are identified by the minute. Updating antivirus definitions weekly or monthly will open you up to the possibility of infection.
Which tool can be used to diagnose why Windows 10/11 is slow and sluggish?
A) Resource Monitor
B) msconfig.exe
C) Device Manager
D) Reliability Monitor
Resource Monitor
A. Resource Monitor can be used to identify slow and sluggish performance, as well as identify the source of the problem. The msconfig.exe tool can be used to enable or disable services on startup and launch tools, but it cannot be used to diagnose performance issues. The Device Manager MMC can be used to view and modify devices, but it will not help diagnose performance problems. Reliability Monitor will display the reliability of the operating system, but it will not help diagnose problems with performance.
Which tool will allow you to diagnose why Windows Update keeps failing?
A) ntbtlog.txt
B) Windows Update Troubleshooter
C) Windows Recovery Environment
D) Safe mode
Windows Update Troubleshooter
B. Windows Update Troubleshooter can assist in diagnosing problems with Windows Update. The ntbtlog.txt file is used to diagnose problems with bootup. Windows Recovery Environment is used to solve problems with Windows and is not typically used for problems with Windows Updates. Safe mode is a boot mode that loads minimal drivers and services.
Which of the following programs could be considered antimalware?
A) Microsoft Defender Security
B) MDM
C) Windows Action Center
D) VirusTotal
Microsoft Defender Security
A. Microsoft Defender Security is considered antimalware and antivirus protection for the Windows operating system. Mobile device management (MDM) software is used to manage mobile devices. Windows Action Center is a notification center for action to be taken in the operating system. VirusTotal is a third‐party site that analyzes virus signatures, but it does not protect you from them.
Which of the following tools allows you to manually fix maliciously modified system files?
A) regedit
B) SFC
C) bootrec
D) UAC
SFC
B. The System File Checker (SFC) allows you to manually scan for modified operating system files and repair them. regedit is used to modify the Registry. bootrec is used to repair the boot records on an operating system installation. User Account Control (UAC) is used to control access to administrative credentials.
Which of the following can you do to help eliminate security problems? (Select the best answer.)
A) Establish security policies and procedures.
B) Optimize drives.
C) Prevent booting into safe mode.
D) Prevent booting into Windows Recovery Environment.
Establish security policies and procedures
A. Establishing security policies and procedures will help eliminate security problems and guide employees on what to do if they arise. Optimizing drives will defragment drives and has no effect on security. Preventing booting into safe mode will only hinder diagnostics. Preventing booting into Windows Recovery Environment will also hinder diagnostics.
A mobile device is running out of RAM. What could be the most likely problem?
A) The device is not charged to capacity.
B) The digitizer is not functioning properly.
C) The device is in DND mode.
D) The device has background applications open.
The device has background applications open.
D. The device most likely has too many background applications open that are using RAM. That the device is not charged to capacity would not affect RAM. A digitizer not functioning properly would resemble inaccurate touchscreen responses. If the device were in Do Not Disturb (DND) mode, the speakers would not work.
What is a risk of using the auto‐reconnect feature on a mobile device?
A) The device will reconnect to any SSID.
B) The device could be exploited by an evil twin attack.
C) The device’s battery life could be shortened.
D) You may exceed your cellular data plan’s limits.
The device could be exploited by an evil twin attack.
B. If auto‐reconnect is configured on an SSID, the device could be susceptible to an evil twin attack, in which the device connects to any device with the same SSID. The device will not reconnect to any SSID but only to the SSID configured as auto‐reconnect. Battery life will remain unaffected with auto‐reconnect. Exceeding limits can be avoided with auto‐reconnect, because the wireless network is used for data usage.
You notice that the reliability of the operating system has diminished in Reliability Monitor. Where can you find more details on why applications are failing?
A) Device Manager
B) Event Viewer
C) Windows Recovery Environment
D) msconfig.exe
Event Viewer
B. Event Viewer will allow you to see more detailed information on why programs have crashed. The Event Viewer logs may not give the exact reason, but they will aid in understanding the root cause. Device Manager is used to view and manage devices connected to the operating system. The Windows Recovery Environment is used to repair the Windows operating system. The msconfig.exe tool is used to modify startup programs and launch other diagnostic tools.
Why would the operating system write out large amounts of RAM to the page file?
A) The CPU is running high on utilization.
B) This is a normal process of the operating system.
C) The amount of physical RAM is low.
D) The page file is faster than conventional RAM.
The amount of physical RAM is low
C. The reason that the operating system would write out large amounts of RAM to the page file is that the system is running low on physical RAM and is attempting to free up physical RAM. The CPU might run high when paging occurs, but it will not trigger excessive paging. Although it is normal for the operating system to write out RAM to the page file, it is not normal for large amounts to be written out. The page file is not faster than conventional RAM.
What is one consequence of an overheating mobile device?
A) Higher RAM usage
B) Degraded battery life
C) Inaccurate touchscreen response
D) Inability to decrypt emails
Degraded battery life
B. Degraded battery life can be expected from an overheating mobile device if the problem persists for a long time. Higher RAM usage will not occur with overheating, but it could be a cause of overheating. Inaccurate touchscreen responses are not a symptom or a consequence of overheating. The inability to decrypt emails depends on having the proper certificate installed.
a ____ happens when the windows kernel crashes upon boot
BSOD (blue screen of death)
the _____ file can be checked for a failed driver during boot.
ntbtlog.txt
______ can be used to view and kill processes
task manager or resource monitor
the ____ server is responsible for serving the correct time to a client.
NTP (network time protocol)
on the ____ tab of service, you can configure what happens if the service fails.
recovery
_____ software should be installed on mobile devices to prevent malicious software
anti virus or anti malware
the _____ can be used to set boot logging.
system configuration
the ____ can be used to repair the operating system
windows recovery environment
the _____ can be used to look at errors, warnings and messages in the operating system
event logs
______ and ______ should be checked if a mobile device is experiencing power drain.
RAM, CPU
the USB controller supports both power and ____ allocation.
endpoint
______ are advertisements that appear behind a web page.
pop unders
the ____ service is responsible for installing applications and has permission to modify certain files.
trusted installer
the ____ allows a person to elevate their privileges on the operating system by prompting them on the screen
UAC (user account control)
_______ is a type of browser redirection that is used to compromise credentials.
pharming
the last step in malware removal is ______.
educating the end user
a _____ can be used to remove stubborn malware and viruses
microsoft defender offline scan
before remediating an infected system, you should disable ____
system protection
______ can damage and shorten the life of mobile device batteries
heat
_______ allows you to turn off all network connections at once on a mobile device.
airplane mode
what technology allows pairing of mobile devices and, on occasion, the ability to transfer files between them?
bluetooth
you should ____ an unresponsive mobile device.
hard-reset
using the ____ wireless band can help with wireless interference.
5 Ghz
______ software can disable the camera and the microphone on mobile devices.
MDM (mobile device management)
when an application is not loading on a mobile device, what is the
first troubleshooting step?
A) force-quit the application
B) factory reset the phone
C) clear the application’s cache
D) reinstall the application
A) force-quit the application
Best practices for malware removal: (7 steps)
1 identify and verify malware symptoms
2 quarantine the infected systems
3 disable system restore in windows
4 remediate infected systems
5 schedule scans and run updates
6 enable system restore and create a restore point in windows
7 educate the end user
an organization wants to perform a form of redirection in which the
traffic intended for one host is sent to another. which of these will
help the organization in the given scenario?
A) pharming
B) pop-ups
C) NFC
D) Desktop alert
A) pharming
you need to kill a process on an operating system in which the
application seems to be frozen. what should you do to minimize
disruption?
A) reboot the operating system
B) use system protection to view activity
C) log the user off
D) use resource monitor
D) use resource monitor
what happens when RAM is filled up?
A) the mobile device will open background memory pages onto the
built-in storage
B) the mobile device will swap background memory pages onto the
built-in storage
C) the mobile device will delete background memory pages onto the
built-in storage
D) the mobile device will close background memory pages onto the
built-in storage
B) the mobile device will swap background memory pages onto the
built-in storage
which of these is the program used to boot windows?
A) winload.exe
B) resume.exe
C) win.exe
D) winres.exe
A) winload.exe
which of the following tools allows users to manually fix maliciously modified system files?
SFC, bootrec, UAC, regedit
SFC