Chapt 24 (Chapt 8 SW Trblestg) Flashcards

1
Q

A technician is troubleshooting a Windows 10 computer that is acting strangely, and they suspect that it is infected with a virus. They have followed the best practices for malware removal and remediated the computer. What should they do next?

A) schedule scans and run updates
B) educate the end user
C) enable system restore and create a restore point
D) disable system restore in Windows

A

Schedule scans and run updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the complete steps for malware removal process?

A

1 investigate and verify malware symptoms
2 quarantine infected systems
3 disable system restore and windows
4 remediate infected systems
1 update anti-malware software
2 scanning and removal techniques example safe mode pre-installation environment
5 schedule scans and run updates
6 enable system restore and create a restore point in Windows
7 educate the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is working on a Windows 10 workstation that seems to be unstable. They want to ensure that system files have not been altered. Which command should they use to scan and fix corrupted system files?

A) sfc /scanfix
B) sfc /scanfile
C) sfc /verifyonly
D) sfc /scannow

A

sfc /scannow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user reports that his Windows 10 start menu looks wrong. You know the environment relies on roaming profiles. What is a reliable solution to the user’s problem?

A) rebuild the desktop image
B) rebuild the windows user profile
C) delete the registry on the local machine
D) reboot the machine

A

Rebuild the windows user profile

Roaming profiles 10 to experience problems, most of which can be reliably fixed by rebuilding the windows profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user reports that a word document they need will not open. Other documents open as they should. They have not made a backup of this file. Which of the following statements is true?

A) the file is probably corrupted, and its contents are lost
B) they can use a restore point to get the file back
C) they can use the command line utility to open the document
D) they can use WinRE to repair the file and then open it

A

A

If a file will not open in the GUI graphical user interface, it probably won’t open at a command prompt either

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are using an iphone. When is it generally necessary to close running apps on the iphone?

A) when you receive out of memory errors
B) when the phone is sluggish
C) when an app locks up
D) when you are done using them for the day

A

When an app locks up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network user with an Android tablet wants to backup and synchronize their data with their phone. Which service should they use to perform these tasks?

A) Google sync
B) Google Cloud
C) Android sync
D) Android Cloud

A

A
Google Sync is available for backups and synchronization of data between android-based devices and PCs that have a Microsoft Exchange account. Google cloud is their IaaS infrastructure as a service platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A client has a Windows 11 computer with a virus on it. They have quarantined the system from the rest of their Network. To follow malware removal best practices, what should be done next?

A) investigate and verify malware symptoms
B) disable system restore in Windows
C) enable system restore and create a restore point in Windows
D) update anti-malware software

A

Disable system restore in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your Windows desktop system is running sluggishly. You have a magnetic hard drive and an M.2 drive. What could you do that might improve system performance? Choose two.

A) run optimize and defragment drive on the magnetic media drive
B) run disc cleanup on both drives
C) run optimize and defragment drive on the M.2 drive
D) run sfc

A

A, B
If you save many large files, and the hard drive gets to be under 10% free space, it’s performance can slow down dramatically. The disc cleanup utility will show you how much disk space is being taken up by temporary files, log files, the recycle bin, and other items that can easily be deleted. This could free up some disk space. Optimize and defragment Drive will help with mechanical hard drives, but not the solid state drives. In fact running it could damage a solid state drive. As you access and change files on a drive, the parts of the drive can end up scattered in different places. With a mechanical drive, retrieving the file will be faster if the files pieces are all next to each other on the drive. Defragmenting the drive rearranges it and puts each file scattered pieces together. System file Checker should be run if you’re having problems related to your system files. It will not free up space on your drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your Windows PC is acting poorly after you installed a few poorly written applications. Now the system will not function properly. You want to refresh your Windows installation but keep your personal files. Where can this be done from? Choose two.

A) system recovery options
B) safe mode
C) emergency repair disc
D) WinRE

A

B, D
There are options for entering safe mode. If you are able to use the os, then go to settings and search for advanced startup, then choose change Advanced startup options, and under Advanced startup, click restart now. This will restart the computer and bring up the Windows recovery environment. Alternately, hold the shift key while restarting the computer. This will also cause the PC to boot into the Windows recovery environment. To access safe mode choose troubleshoot then Advanced options then startup settings then safe mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user is unable to access the network and is getting an error message that a duplicate IP exist on the system. You are confused because you have a DHCP server. What do you need to do next?

A) manually configure the IP address
B) ensure that this computer is set to obtain an IP address automatically
C) ping the IP address from another computer to find out the name of the duplicate computer
D) at a command prompt enter ipconfig /release, then ipconfig /renew

A

B
Ensure that this computer is set to obtain an IP address automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Windows users antivirus software has crashed. They reboot the computer and try to open it again, and it crashes again. What should be done next to solve the problem? Choose two.

A) look for a patch or update on the manufacturer’s website
B) delete the antivirus software and reinstall it
C) remove and reinstall Windows
D) repair the antivirus installation through programs and features and control panel

A

A, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your Windows computer was working fine yesterday, but today it is exhibiting slow performance. Which of the following tools should be used to check for a potential problem causing the slowdown? Choose two

A) anti-malware software
B) Event Viewer
C) task manager > processes tab
D) programs and features in control panel

A

A, C
If the computer was fine yesterday and slow today, your first thought should be that it may have been attacked by malware. Malware running in the background is notorious for taking up system resources. Your first course of action should be to follow the malware removal process. If malware is not found on your system, look next at the processes tab of task manager. Click memory at the top to sort the list by how much memory each program is using. It may be software launched at startup that you don’t need or another program that doesn’t need to run all the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Windows user at your office receives the following message,
“Before you can perform print related tasks such as page setup or printing a document, you need to install a printer”
They know that there were two printers listed yesterday. What is likely the problem?

A) someone has deleted their printers
B) both of the printers are offline
C) both printers are out of paper
D) The Print Spooler service needs to be restarted

A

They print school or service needs to be restarted

When The Print Spooler service is not running, a user will not be able to see or print to any of their devices. Open the services console and restart The Print Spooler to remedy the situation. If the printers were offline or out of paper, most likely the printer would send a message stating such to the users screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Windows computer user receives an error message that a needed service failed to start. Where can that user go to start the service? Choose two.

A) Services tab of task manager
B) computer management
C) the services console
D) device manager

A

A, C
All services can be found in the services console. A subset of those can be found on the services tab of task manager. If the needed service isn’t there, a link at the bottom of the page will take you to the full list of the services. services.msc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You work for a government entity and they insist that you use the government time server, time.NIST.gov to sync the time on your computer system. Where will you go to do this?

A) in the settings app, select time and language, then date and time, and ensure that set time automatically and set time zone automatically are set to on.
B) open the services console and ensure that the windows time is set to time.NIST.gov and the service is started
C) in control panel, select date and time, and on the internet time tab, Click Change settings, then under server, choose time.NIST.gov
D) double click the time in the taskbar and on the internet time tab under servers, choose time.NIST.gov

A

C
You can choose the time server to sync with by going to control panel, selecting date and time, and on the internet time tab, clicking change settings, then the down arrow on the right of the entry box, and choosing the correct server in the server box. The date and time options will allow you to change settings for time zone and set time automatically, but not which server you are using.

17
Q

You are troubleshooting a Windows workstation that has contracted a virus. According to the best practices for malware removal, which two steps are part of remediating the infected system? Choose two

A) disable system restore and windows
B) schedule scans and run updates
C) update anti-malware software
D) scan for and remove the malware

A

C, D

18
Q

While booting up a Windows pc, you find it takes a long time at the welcome screen. The message “your roaming profile isn’t synchronized with the server…” appears. Which two of the following are true?

A) the user profile service detected a slow connection
B) a locally cashed profile was loaded
C) user profile service is not running
D) screen resolution is not compatible with the user’s profile

A

A, B

The windows user profile service detects when there is a slow link between the client computer and the domain controller. The service will then load the user’s profile from a copy that is cashed on the local machine. If the user has used a different machine since the last time they used the current one, then the profile changes will not be on the local machine.

19
Q

You just installed new external speakers on a Windows computer, and you have received an error message saying, “not enough USB controller resources” . What would most likely be causing this error? Choose two

A) the motherboard is damaged
B) USB devices are drawing more power than the limit
C) there are too many devices on a USB 3.0 Hub controller
D) the speaker drivers are conflicting with the USB hub controller drivers

A

B, C
USB ports provide limited power to the devices connected to them. If that power is exceeded one or more the devices attached to the controller may stop working and the error message, not enough USB controller resources, maybe generated. They also have a limited number of endpoints available on each port. Some devices use more endpoints than others and if the limit is exceeded, the same error message will be generated.

20
Q

Several mobile device users have reported that when they eat lunch in the garden next to the office building, they have limited internet connectivity. What is the most likely fix for this?

A) boost WAP signal strength
B) have all the users reboot their devices
C) reboot the WAP
D) have the users turn on Wi-Fi on each of their devices

A

Reboot the WAP

A limited connectivity error means that your device is able to connect to Wi-Fi but not to the internet. The fact that this is happening with several users in the same area likely means that it is a problem with the wireless access point, not an individual device. The users are getting a limited connectivity error, so they are connecting to the WAP but not getting an IP address from the DHCP server or router. Tricycling the WAP off and back on to resolve the issue. If that doesn’t work, troubleshoot the connection between the WAP and the router.

21
Q

A user on your network complains that they see a message for a long time that says, waiting for the user profile service, and their profile is very slow to load. What could be the problem?

A) there is a slow link between the domain controller and the client, but it was not correctly detected by the user profile service
B) the user has never logged into this computer before
C) Windows needs to be updated
D) the user entered an invalid password

A

A

This message happens when the user profile service incorrectly identifies the connection between the client and the server as a fast connection, when it is actually slow. These settings can be configured on the domain controller. If the user profile service detects a slow connection, it will load a cached profile from the local machine instead of the roaming profile on the server. If it is the first time the user has logged into a particular machine, then the profile will take longer to load because the entire profile is loaded not just the changes, but it would not generate this error message

22
Q

You are working on a Windows client and have received an error message saying, not enough USB controller resources. Which of the following is not a possible remedy for this situation?

A) plug a USB cable from a power block into one of the USB ports on the motherboard
B) purchase an external Hub or docking station that is separately powered and plug devices into it
C) move devices that don’t need USB 3 speed to USB 2.0 ports
D) disable the xhci mode option in the BIOS/UEFI settings

A

A
Plugging a USB cable from a power block into a port of the motherboard will not solve your problem, and it will likely destroy your motherboard. The first thing you should try is rearranging the devices that are using the USB ports. USB hubs have a limit as to how much power they can provide and the number of endpoints that each Port can support. A device may have multiple endpoints, and devices that are heavily involved in data transfer may use many more endpoints than other devices. Using an external Hub or docking station that is separately powered means that the port won’t be providing power to the devices, so this may result the issue. Disabling the xhci mode option in the bios, UEFI may help with the resource error but it will effectively turn off USB 3.0 and your hubs will behave like 2.0 ports

23
Q

You use an iPad and an iPhone at work. Which of the following represents the greatest threats to leaking personal files or data? Choose two

A) unauthorized root access
B) unintended Wi-Fi connections
C) unauthorized location tracking
D) High resource utilization

A

A, B
When authorized users access devices through unintended connections or unauthorized users access absconded devices such as with root access, they can access the data on the device. Every firm should have a policy for protecting data, encryption, and dealing with leaks when they occur.

24
Q

A smartphone user is concerned about their privacy and wants to ensure that others cannot hack into their phone and track down their location or access their personal data and pictures. Which of the following actions will provide them with some protection to help prevent this from happening? Choose two.

A) install an anti-malware app
B) install OS updates as soon as they are available
C) disable location services
D) enable sync with a cloud provider

A

A, B
Smartphones are susceptible to malware, just like any other computer device. Some malware can be configured to perform unauthorized location tracking. To help prevent this, always patch and update the OS as soon as updates are available and install anti-malware software. Some services such as match require that location services be enabled, but if the user chooses to location services can be disabled. Exactly how to do that depends on the device, but the option is most likely in the settings menu. Enabling sync with a cloud provider will make a backup of their data, but it does nothing to protect it from it being leaked

25
Q

A step in the malware removal best practices is to manually create a restore point and windows. what will the restore point do?

A) create a copy of the entire hard drive
B) create a copy of the user’s folder and system configuration data
C) create a copy of system configuration data
D) create a bootable media with copies of key system files

A

C
A restore point is a copy, or snapshot, of your system configuration at a given point in time. It is like a backup of your configuration but not your data. Snapshots are created within windows by clicking the search icon, typing create a restore point, and selecting it from the list of results. The system properties window opens. It should open on the system protection tab. If not, click the system protection tab, and near the bottom of the screen is a create button next to create a restore point right now for the drives that have system protection turned on. Clicking the create button begins the process of creating a restore point

26
Q

A user wants to use developer mode on their Android device to make some tweaks to the system. What setting will you tell them they should not leave on? Choose two

A) USB configuration
B) show touches
C) developer mode
D) debugging

A

C, D
If developer mode and the debugging feature are left on, then whenever the PC is connected to any computer, the Android device is essentially wide open, meaning that passwords, bank accounts, photos and so on are visible to anyone who accesses it. There are many features that can be manipulated and debugging mode, such as show touches, pointer location, transition animation scale and so on. Just ensure that developer mode and debugging are turned off when you are done with them

27
Q

You are attempting to share pictures with a friend using apples airdrop. You both have Wi-Fi and Bluetooth turned on. Neither of you is using your phone as a hotspot. They have you in their contacts list and their airdrop receiving setting is set to contacts only, yet you still can’t share files with them. Which of the following could be causing the problem? Choose two

A) you are set to receive from everyone
B) your contact card on their phone does not have your Apple ID email or phone number
C) you are not within Bluetooth range of each other
D) they turned off their hotspot

A

B, C
For airdrop to work, you both must have Wi-Fi and Bluetooth enabled. You need to be within Wi-Fi and Bluetooth range. If either party has a hotspot on, it must be turned off. If you are not in the receiver’s contact list and they have their airdrop set to receive from contacts only, then you will not be able to send them information. If you are in their contacts list, then your Apple ID email or your phone number must be in their contact card. If they change their airdrop receiving setting to everyone, then they can receive the file even if you are not in their contacts list

28
Q

You aren’t training a class on the installation and repair of Windows 10 and 11 period What is the purpose of Windows PE? Choose two

A) runs an operating system on thin clients
B) collects information during a Windows installation
C) launches the WinRE for troubleshooting
D) repair system files if any become corrupted

A

B, C
The windows pre-installation environment PE is a minimal operating system, designed to prepare a computer for installation or to boot into for launching troubleshooting tools such as the Windows recovery environment. It is not intended to be an operating system on a computer but rather a stepping stone to get an OS installed or repaired