Common Windows OS Problems Flashcards
An employee reports an issue in which they state they cannot print. The help desk technician discovers that the employee uses a peripheral hub with four additional devices connected via a single connector to the computer. What is causing the issue with the printer?
USB Controller Resource Warning
A cyber intern needs to create a living record of tech complaints presented by the organization’s employees. The issue with the highest number of complaints is application crashes. What is unique to application crashes?
It occurs when a program stops unexpectedly.
A cyber architect is reviewing a help ticket in which an employee is complaining that their computer halts during boot up or stops working in the middle of a session. When asked specifically what the computer was doing, the employee stated that the device simply stopped what it was doing and displayed a crash screen with a frowning face. What is the employee observing from the computer?
Blue Screen of Death
A cyber architect analyzes a computer returned for application and performance issues. As part of their analysis, the architect uses a utility that has a manual interface to review system files and restores stored files if found to be corrupt or damaged. What is the architect using to test files?
Sfc
A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?
Restart services
A cyber architect wants to enhance their work computer for better optimization, storage space, and speed efficiency. What can the architect consider to meet the desired optimization outcome?
Add resources; The cyber architect can add resources to support the needs of the computing work. An example of adding a resource can include using a solid-state device over a standardized hard-disk drive. More recently, the resource of cloud storage versus physical storage has provided better support to users.
A cyber engineer identifies a disk drive while working on a computer, but the loader does not reflect the location. What computer issue is the engineer observing in this instance?
No OS found; A “no OS found” type message can appear when a disk drive is identified as the boot device but does not report the location of the OS loader.
A cyber consultant reviews the help ticket log and notices several computers submitted for repairs due to being out of sync with other systems. What is the consultant observing in the log?
Time drift
A software engineer troubleshoots an “OS not found” issue on a company computer and wants to repair the boot sector. What recovery mode command prompt can the engineer use to accomplish this troubleshooting task?
bootrec/fixboot; If the system firmware reports the disk’s presence but Windows still will not boot in a no OS found situation, use a startup repair tool to open a recovery mode command prompt. Enter bootrec/fixboot to attempt repair of the boot sector.
A cyber architect is reviewing a ticketed computer and discovers that the newest driver is corrupted and wants to revert to a good driver. What can the architect do to complete this task?
There are instances when drivers are not effective, whether containing bugs or not fully tested, where a user wants to roll back to the last known good driver.
A cyber technician successfully captures the user profile for a computer that is demonstrating performance issues. The technician moves this profile onto a new computer for the employee’s use. What is this called?
Reimaging the device
A cyber architect troubleshoots a computer with the message that reflects “OS not found.” What recovery mode command prompts repair of the master boot record (MBR)?
bootrec/fixmbr
A software engineer is reviewing a help ticket where an employee can not access their account due to corrupted files but has to regain the data. What method allows the engineer to take uncorrupted data and place it in a new account for the employee?
Rebuild Windows profile; Operating systems allow users to rebuild a profile by taking uncorrupted data and adding it to the functional profile.
A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer’s file system?
Symptoms of security issues in the file system include files being renamed or deleted.
A cyber consultant troubleshoots a computer with anomalous errors and believes the issues originated from malware infection. What is a symptom of security issues associated with malware?
Symptoms of security issues in the file system include altered system files or personal files with date stamps and file sizes different from known-good versions.