Common Windows OS Problems Flashcards

1
Q

An employee reports an issue in which they state they cannot print. The help desk technician discovers that the employee uses a peripheral hub with four additional devices connected via a single connector to the computer. What is causing the issue with the printer?

A

USB Controller Resource Warning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A cyber intern needs to create a living record of tech complaints presented by the organization’s employees. The issue with the highest number of complaints is application crashes. What is unique to application crashes?

A

It occurs when a program stops unexpectedly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A cyber architect is reviewing a help ticket in which an employee is complaining that their computer halts during boot up or stops working in the middle of a session. When asked specifically what the computer was doing, the employee stated that the device simply stopped what it was doing and displayed a crash screen with a frowning face. What is the employee observing from the computer?

A

Blue Screen of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A cyber architect analyzes a computer returned for application and performance issues. As part of their analysis, the architect uses a utility that has a manual interface to review system files and restores stored files if found to be corrupt or damaged. What is the architect using to test files?

A

Sfc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?

A

Restart services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A cyber architect wants to enhance their work computer for better optimization, storage space, and speed efficiency. What can the architect consider to meet the desired optimization outcome?

A

Add resources; The cyber architect can add resources to support the needs of the computing work. An example of adding a resource can include using a solid-state device over a standardized hard-disk drive. More recently, the resource of cloud storage versus physical storage has provided better support to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A cyber engineer identifies a disk drive while working on a computer, but the loader does not reflect the location. What computer issue is the engineer observing in this instance?

A

No OS found; A “no OS found” type message can appear when a disk drive is identified as the boot device but does not report the location of the OS loader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cyber consultant reviews the help ticket log and notices several computers submitted for repairs due to being out of sync with other systems. What is the consultant observing in the log?

A

Time drift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A software engineer troubleshoots an “OS not found” issue on a company computer and wants to repair the boot sector. What recovery mode command prompt can the engineer use to accomplish this troubleshooting task?

A

bootrec/fixboot; If the system firmware reports the disk’s presence but Windows still will not boot in a no OS found situation, use a startup repair tool to open a recovery mode command prompt. Enter bootrec/fixboot to attempt repair of the boot sector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A cyber architect is reviewing a ticketed computer and discovers that the newest driver is corrupted and wants to revert to a good driver. What can the architect do to complete this task?

A

There are instances when drivers are not effective, whether containing bugs or not fully tested, where a user wants to roll back to the last known good driver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cyber technician successfully captures the user profile for a computer that is demonstrating performance issues. The technician moves this profile onto a new computer for the employee’s use. What is this called?

A

Reimaging the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A cyber architect troubleshoots a computer with the message that reflects “OS not found.” What recovery mode command prompts repair of the master boot record (MBR)?

A

bootrec/fixmbr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A software engineer is reviewing a help ticket where an employee can not access their account due to corrupted files but has to regain the data. What method allows the engineer to take uncorrupted data and place it in a new account for the employee?

A

Rebuild Windows profile; Operating systems allow users to rebuild a profile by taking uncorrupted data and adding it to the functional profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer’s file system?

A

Symptoms of security issues in the file system include files being renamed or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A cyber consultant troubleshoots a computer with anomalous errors and believes the issues originated from malware infection. What is a symptom of security issues associated with malware?

A

Symptoms of security issues in the file system include altered system files or personal files with date stamps and file sizes different from known-good versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician is reviewing open-source literature on redirection. What type of malware exploits a target page to capture authentication details?

A

Spyware; Redirection is where the user tries to open one page but gets sent to another. Often this may imitate the target page. Spyware may exploit it to capture authentication details.

17
Q

A software engineer is having issues with one of the company laptops and believes it may have malware. What is a symptom that the device may have been affected by malware?

A

When the computer is slow or “behaving oddly,” one of the things that the engineer should suspect is that malware has infected the device. A symptom can include the host being unable to access the network or internet.

18
Q

A cyber associate reviews the company policy on troubleshooting desktop symptoms of malware infection. What is a key indicator that malware infection has occurred in security-related applications?

A

OS Update Failure; One of the key indicators of malware infection is that security-related applications, such as antivirus, firewall, and Windows Update, stop working. Additionally, operating system (OS) updates may fail, leaving the device in a compromised status.

19
Q

A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer’s file system?

A

File names of saved work have changed.

20
Q

A technician is trying to troubleshoot a system impacted by malware. According to the CompTIA best practice procedure, what should also be done as a safety precaution when disabling system restore points?

A

Delete old system restore points and backup copies.

21
Q

A cyber analyst is attempting to remove malware from a company system and is following the steps of the CompTIA best practice procedure for malware removal. What step focuses on updating anti-malware software?

A

Fourth

22
Q

Upon remediating infected systems, the technician is ready to move to the next step of the CompTIA best practice procedure for malware removal. What is the next step in the CompTIA process?

A

Scheduling scans and running updates is the fifth step in CompTIA’s best practices procedure for malware removal. This step uses anti-malware software, scans, and removal techniques to remove the malware from the device.

23
Q

A cyber technician follows the CompTIA best practice procedure on malware removal and is ready to remediate one of the company’s infected systems. What tools are synonymous in remediating infected systems?

A

Antivirus and malware software

24
Q

A cyber architect removed malware from an employee’s computer, successfully quarantined the infected system, and disabled system restore. While following the CompTIA procedure for malware removal, what should the architect do as part of the remediation of infected systems?

A

Quarantine the infected system; The second step in CompTIA’s best practices procedure for malware removal is to quarantine infected symptoms, which means that the host will be in an area where it cannot communicate with the main network.

25
Q

A technician reviews step 2 of the CompTIA best practice procedure for malware removal. While quarantining infected systems, what should the technician do first?

A

Disconnect the network link; Putting a host in quarantine means that it cannot communicate on the main network. A threat actor might use backdoor malware to attempt to access other systems. One of the first actions should be to disconnect the network link.

26
Q

A cyber analyst is attempting to remove malware from a company system and is following the steps of the CompTIA best practice procedure for malware removal. What step focuses on updating anti-malware software?

A

Fourth Step

27
Q

A technician reviews the best practice procedure that CompTIA created regarding malware removal. What step(s) are associated with remediating infected systems?

A

Scanning and removal techniques; and updating malware software.

28
Q

A technician attempts to remove malware while following the CompTIA best practices procedure. After investigating malware systems, what is the next step for the technician?

A

Quarantine the infected system

29
Q

A helpdesk technician reviews the CompTIA best practice guide regarding malware removal as they are putting together a presentation for the businesses’ cyber department. What is associated with remediating infected systems?

A

Use of scanning and removal techniques