RG: Ch 8: Software Troubleshooting Flashcards
What is external code that changes your Internet Explorer settings?
A. Man-in-the-middle attack
B. Browser redirection
C. SYN flood
D. Fraggle
B. Browser redirection
A browser redirection is one of the most serious security problems. Browser hijacking software is external code that changes your Internet Explorer settings. It may include changing your home page or adding or removing items from your favorites. A man-in-the-middle attack is when the malicious individual positions himself between two communicating system, receiving all data. A SYN flood is a form of a DoS attack. Fraggle is an attack using UDP packets.H1 Section: Given a scenario, troubleshoot and resolve PC security issues.
Which of the following is the not an indication of a security issue with a mobile device?
A. Power drain
B. Weak signal
C. Slow speeds
D. Low resource utilization
D. Low resource utilization
On the contrary, evidence of malware or other issues is usually accompanied by very high resource utilization. Unusual loss of power, slow speeds, and a weak signal are all signs of security issues.
Which of the following is the first step in malware removal?
A. Remediate the infected systems.
B. Quarantine the infected systems.
C. Educate the end user.
D. Identify and research malware symptoms.
D. Identify and research malware symptoms.
The steps are as follows:
Identify and research malware symptoms.
Quarantine the infected systems.
Disable System Restore (in Windows).
Remediate the infected systems.
Schedule scans and run updates.
Enable System Restore and create a restore point (in Windows).
Educate the end user.
Which of the following does not negatively impact mobile battery life?
A. Low brightness setting
B. Location services
C. Enabled Bluetooth
D. Overheating device
What Windows service should be disabled before cleaning an infection?
A. NAT
B. System Restore
C. Windows Firewall
D. Antivirus
B. System Restore
Although it is recommended that you disable System Restore before cleaning an infection, it is a good idea to create a restore point after an infection is cleaned. This gives you a clean restore point going forward in case the system becomes infected again at some point. Network address translation, the Windows Firewall, and your antivirus should not be disabled.
Which of the following is not a possible cause of a “no operating system found” message?
A. Nonsystem disk in the floppy drive
B. Incorrect boot device order in the BIOS
C. Corrupted or missing boot sector
D. System disk in the DVD drive
D. System disk in the DVD drive
If there were a disk with system files in the DVD drive, the system would boot to it. A nonsystem disk, a corrupted or missing boot sector, and an incorrect boot order in the BIOS could all be possible causes.H1 Section: Given a scenario, troubleshoot and resolve PC security issues.
Which of the following is not a symptom of malware?
A. Increase in performance
B. Internet connectivity issues
C. Browser redirection
D. Pop-ups
A. Increase in performance
Malware decreases performance. It can cause Internet connectivity issues, browser redirection, and pop-ups.
Which of the following does not cause overheating of a mobile device?
A. Excessive gaming
B. Leaving phone on
C. Old battery
D. Continuous online browsing
B. Leaving phone on
While leaving the phone on will run down the battery, it will not alone cause it to overheat. Excessive gaming, using an old battery, and continuous online browsing will cause overheating.
Which type of file cannot be copied from another machine if missing or corrupted?
A. .dll
B. boot.ini
C. ntldr
D. bootmgr
B. boot.ini
The boot.ini file is specific to the machine. A .dll file is a file type and not a specific file. The ntldr is the file that loads the operating system. Bootmgr is a file in later systems that manages the boot process. H1 Section: Given a scenario, troubleshoot Microsoft Windows OS problems.
Which of the following is an indication of a security issue with a mobile device?
A. Low resource utilization
B. Disabled microphone
C. Enabled camera
D. Authorized account access
C. Enabled camera
When cameras have been enabled when they weren’t previously, it is an indication of compromise. Low resource utilization, a disabled microphone, and authorized use of the device are not symptoms of a security issue.