Domain 4: Software Troubleshooting Session 1 Flashcards
After installing a program, a system has become unstable to the point to where it will not boot up properly. Which configuration option should a technician choose from the Advanced Boot Options screen to attempt to start the system properly?
Choices:
A - Safe Mode
B - Configuration Mode
C - Safe Mode with Configurations
D - Last Known Good Configuration
D - Last Known Good Configuration
On a Windows 8 or Windows 8.1 machine, which key or key combination should a technician press to bring up the Advanced Boot Options screen?
Choices:
A - F2
B - F8
C - Shift+F2
D - Shift+F8
D - Shift+F8
A technician is in the Windows 7 System Recovery Options screen. A user stated that installing a program made the system very unstable. Which option should the technician choose to attempt to stabilize the system?
Choices:
A - Startup Repair
B - System Restore
C - System Image Recovery
D - Windows Memory Diagnostic
B - System Restore
Which item in the Control Panel is used to start the process of changing which program opens a particular file type?
Choices:
A - Folder Options
B - Personalization
C - Default Programs
D - Programs and Features
C - Default Programs
Which Control Panel app can a technician run in Windows 8 to test compatibility for a program built to run in Windows 7?
Choices:
A - Windows Program Diagnostics
B - Hardware Compatibility Checker
C - Program Compatibility Troubleshooter
D - Software Compatibility Troubleshooter
C - Program Compatibility Troubleshooter
A system is rebooted after not being shut down properly. Which will most likely happen?
Choices:
A - BSoD
B - The system will boot into Safe Mode
C - An error message will appear, indicating the system was not shut down properly
D - The system will boot into Safe Mode and an error message will appear indicating the system was not shut down properly
C - An error message will appear, indicating the system was not shut down properly
If a computer continually boots into Safe Mode, which Windows utility may have the computer set to always boot into Safe Mode?
Choices:
A - DXDIAG
B - MSINFO
C - MSINFO32
D - MSCONFIG
D - MSCONFIG
Which item occurs when a dark gray screen appears on a Mac indicating a user must reboot the system?
Choices:
A - SPoD
B - BSoD
C - GRUB error
D - Kernel panic
D - Kernel panic
Which two areas of the Task Manager will show a user why a system is running slow?
Choices:
A - CPU
B - Startup
C - Memory
D - Services
A - CPU
C - Memory
A technician needs to check the validity of system files using SFC. Which option in the recovery console should the technician select in order to do this?
Choices:
A - Startup Repair
B - System Restore
C - Command Prompt
D - System Image Recovery
C - Command Prompt
Which type of media is needed to create a system repair disc in Windows 7?
Choices:
A - TV
B - USB
C - DVD
D - Floppy
C - DVD
In the Windows 7 Disk Defragmenter, which button is used to see if a disk has a high fragmentation percentage?
Choices:
A - Check disk
B - Analyze disk
C - Defragment disk
D - Configure schedule
B - Analyze disk
A technician wants to unregister the schmmgmt.dll file. How should the technician enter this command in the command prompt window?
Choices:
A - unregsvr schmmgmt.dll
B - regsvr /u schmmgmt.dll
C - unregsvr32 schmmgmt.dll
D - regsvr32 /u schmmgmt.dll
D - regsvr32 /u schmmgmt.dll
Which items are found in the Windows Logs area of Event Viewer? Choose three answers.
Choices:
A - System B - Security C - Windows D - Installation E - Application
A - System
B - Security
E - Application
In Windows 8, which media type is used to create a recovery drive?
Choices:
A - CD
B - Solid-state
C - Network drive
D - USB flash drive
D - USB flash drive
Which item provides recovery options for a Windows 7 machine?
Choices:
A - Backup disk
B - Recovery drive
C - System repair disc
D - System repair image
C - System repair disc
Users can perform which three actions on an application or program in the Control Panel?
Choices:
A - Repair it B - Uninstall it C - Reinitialize it D - Change its settings E - Restore its settings
A - Repair it
B - Uninstall it
D - Change its settings
Where should an antivirus check be run if a technician suspects a virus has infected a boot sector?
Choices:
A - In Safe Mode
B - In Safe Mode with Networking
C - In the preinstallation environment
D - In Safe Mode with Command Prompt
C - In the preinstallation environment
Which are possible symptoms for malware on a computer device? Choose four answers.
Choices:
A - Pop-ups B - DNS crash C - BIOS setup D - Security alerts E - PC/OS locks up F - Browser redirection
A - Pop-ups
D - Security alerts
E - PC/OS locks up
F - Browser redirection
Which are signs of a hijacked email account? Choose two answers.
Choices:
A - Invalid certificates
B - Unknown IP addresses
C - Email is sent to people in the account’s address book
D - Failed delivery notifications from unknown email addresses
C - Email is sent to people in the account’s address book
D - Failed delivery notifications from unknown email addresses
If there is an issue with a website’s __________, then the user should play it safe and not visit the site.
Choices:
A - host
B - IP address
C - DNS server
D - security certificate
D - security certificate
Often malware will affect which settings in relation to Internet connectivity?
Choices:
A - IP address
B - DNS server
C - Proxy server
D - MAC address
C - Proxy server
Which is a sign of malware in relation to Windows Update?
Choices:
A - Failed installations
B - Compatibility issues
C - Unauthorized Group Policy changes
D - Random Windows Registry changes
A - Failed installations
A user has reported that a number of files have gone missing from their computer. The user’s computer was recently upgraded. Which action should the technician perform?
Choices:
A - Run MSCONFIG
B - Reinstall the operating system
C - Reset the PC to a Restore Point
D - Check the user’s Folder Options menu
D - Check the user’s Folder Options menu
A user has reported an issue with a file they no longer have access to. Since the user needs access to the file and the administrator claims the user already has permission to access it, which action should the technician take?
Choices:
A - Run MSCONFIG
B - Run a black hat configuration
C - Repair the boot record and run antimalware software
D - Run the computer in Safe Mode and restore factory settings
C - Repair the boot record and run antimalware software
Which security tool is used to fix system file issues?
Choices:
A - Event Viewer
B - File command
C - Linux terminal
D - Windows Update
C - Linux terminal
Mobile devices often have automatic display settings which affect __________.
Choices:
A - apps
B - brightness
C - the operating system
D - touch screen sensitivity
B - brightness
A user is trying to show a presentation, but there is no display. All of the connections are where they should be between the user’s laptop and the external projector. Which action should the user take next?
Choices:
A - Check the video card
B - Check the display configuration settings
C - Run a system check for external devices
D - Unplug the power supply and wait 30 seconds before trying again
B - Check the display configuration settings
A user has sound coming from the video game they are playing on a laptop, but the music they have running from a separate application is not coming through. The user should perform which action?
Choices:
A - Check the audio card
B - Check the sound mixer
C - Perform a system restore
D - Check the speaker connections
B - Check the sound mixer
A technician needs to reset a mobile device to its factory settings. Which kind of reset should the technician perform?
Choices:
A - Soft
B - Hard
C - Simple
D - Permanent
B - Hard
Applications can be force stopped from which area of a mobile device?
Choices:
A - Settings
B - Terminal
C - Control Panel
D - Task Manager
A - Settings
A user is experiencing issues with an application on an iOS device. Which is the easiest way the user could uninstall the app?
Choices:
A - Drag it to the trash can
B - Tap and hold it, then tap the x
C - Open the app and uninstall it there
D - Open Settings and uninstall it there
B - Tap and hold it, then tap the x
Email providers will often warn a user if there is unauthorized activity on a(n) __________.
Choices:
A - email
B - profile
C - service
D - account
D - account
Which mobile security tool is used to test Wi-Fi signals?
Choices:
A - Wi-Fi app
B - Wi-Fi checker
C - WiFi analyzer
D - WiFi signal app
C - WiFi analyzer
Which are mobile device backup services? Choose two answers.
Choices:
A - OneDrive
B - Office 365
C - Google Sync
D - Google Drive
A - OneDrive
C - Google Sync