Software and Trouble Shooting Flashcards

1
Q

Sam is an experienced Android user. He has been hired by your department to support all the mobile devices in use by your organization. You must instruct him on backing up the data on an Apple device. Your company only wants to use a solution that would allow devices to be restored from any location. Which app should you recommend?

A) iTunes
B) Microsoft One Drive
C) iCloud
D) Google Drive

A

You should tell him about iCloud, which is the app used to back up an Apple device. With iCloud, the device could be restored from any location that has an Internet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Thomas has been given a company iPad that will be used for storing private data and photos of clients. He needs to protect the integrity of the data on this device. What should he do? (Choose two.)

A) Turn on Touch ID and Passcode.
B) Turn on Find My iPhone in Settings.
C) Turn on WiFi.
D) Turn on Bluetooth.

A

Thomas should turn on Find My iPhone in Settings and turn on Touch ID and Passcode. Apple includes built-in theft prevention and privacy protection on their devices. The two that should be mandatory for users are turning on Find my iPhone and Touch ID and Passcode settings. Applying safeguards to any mobile device can help alleviate theft or loss and as you can imagine, any device considered lost or stolen should be reported to the appropriate personnel staff so that further investigation of its whereabouts can be researched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

David works in the IT department and is training his team on how to look for certain attacks. He is discussing a type of attack that redirects you to a fake Web site. Which type of attack is he discussing?

A) network address hijacking
B) land attack
C) hyperlink spoofing
D) ICMP packet spoofing

A

Hyperlink spoofing, which is also referred to as Web spoofing, is used by an attacker to persuade the Internet browser to connect to a fake server that appears as a valid session. The primary purpose of hyperlink spoofing is to gain access to confidential information, such as PIN numbers, credit card numbers, and bank details of users. The link as it appears on this page is often correct. However, the actual underlying link is usually to the spoofed site. Beware of sites that ask for confidential information, especially if they have never done so in the past. This is usually a sign that a hyperlink spoof has occurred.

Hyperlink spoofing takes advantage of people using hyperlinks instead of DNS addresses. In most scenarios, the DNS addresses are not visible, and the user is redirected to another fake Web site after clicking a hyperlink.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician contacts you and says that he needs to access the Advanced Recovery Options on a Windows 10 computer. Which procedure or special key should he use?

A) Press F6 during the text mode of booting.

B) Press F2 during the text mode of booting.

C) Restart the device and boot from installation media.

D) Press F8 during the text mode of booting.

A

To access Advanced Recovery Options on a Windows 10 computer, boot the computer from installation media or a USB recovery drive. After inserting the media and turning the computer on, select Repair your computer. On the Choose an option screen, select Troubleshoot. From the next screen, select Advanced options.

You would press the F2 key to start ASR during the text mode setup phase of Windows XP. ASR accesses the backup files to read the saved disk configuration and tries to restore all the disk configurations. While Windows XP is no longer supported by Microsoft, individuals taking the A+ exam should be aware that old Windows XP methods may be used as incorrect options for questions on the exam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user calls the help desk to report that her large Excel spreadsheet is not responding. You decide to examine Task Manager to troubleshoot. Which function of Task Manager will be the most helpful in resolving the issue?

A) Restart services
B) Kill tasks
C) Identify limited connectivity
D) See application crashes

A

Either Task Manager (accessed by right-clicking the taskbar) or the Services app (accessed by entering service.msc in the Search bar) will help you to kill tasks. It will identify that Excel is consuming a large amount of resources, and Task Manager will allow you to kill the unresponsive Excel application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

As the desktop engineer in your company, you are responsible for tier-one support, meaning that you compile all problems and report them to the proper technician. Several users report that when they boot their computer it generates a screen with hexadecimal codes on a blue background. Which type of Windows error code is this?

A) a POST error
B) a runtime error
C) a STOP error
D) an illegal operation

A

A STOP error, also known as a Blue Screen of Death (BSOD), is a proprietary crash screen for the Windows operating system. The BSOD will display an error message with a hexadecimal code that indicates what is wrong. Most BSOD errors can be researched in Microsoft’s Knowledge Base. You should also examine system log files to see if you can discover the problem. In most cases, a BSOD occurs because of a change that has been made to the system. If a simple reboot does not resolve the BSOD, then you need to roll back your system changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You manage a network installed with multiple Windows 10 workstations. One of the users reports that his computer does not boot to Windows. You notice that the computer generates the following message during boot up:

Windows 10 could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM

What does the error message indicate?

A) A newly installed application is corrupt.

B) A Windows startup file is corrupt.

C) The registry is corrupt.

D) A configuration file has problems.

A

The registry is corrupt. There can be several reasons behind Windows 10 system registry corruption, such as incorrect computer shutdown, improper device driver installation, or unsupported or corrupted application installation. Microsoft provides a solution to recover from this problem by performing a Windows repair with the CHKDSK /r command, replacing corrupted system files from the Windows media, or restoring Windows to the previous system state by running the Windows system restore program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Susan has called the help desk to report a frozen screen on her mobile device. After troubleshooting, you determine that she has a frozen system. What should you instruct her to do next?

A) Elevate to next level of technical support.

B) Press the CTRL+ALT+DEL keys.

C) Force a restart by holding down the Power button.

D) Call the mobile device technical support.

A

You should ask her to force a restart by holding down the Power button. A frozen system occurs when the system freezes up and stops working completely. If the computer is an Apple device, you will have to press and hold the Sleep/Wake and Home buttons simultaneously for 10 seconds until you see the Apple logo appear. If this does not work, then you should try to plug in the device to an outlet and charge it because it may have lost all of its battery charge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

As an IT technician for a large corporation, you need to be able to know the WiFi usage on company-issued mobile devices. In addition, you need the ability to determine if there are any available networks nearby. What should you use?

A) a WiFi analyzer
B) a cell tower analyzer
C) a factory reset
D) a force stop

A

You should use a WiFi analyzer. It can show you the WiFi usage on a mobile device. It can also should any nearby networks or troubleshoot security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Thomas is teaching a class for new users and wants to cover what to do and what not to do online. He specifically discusses spyware and malware infections and how they occur. What are some of the warning signs he should teach them to be aware of? (Choose all that apply.)

A) The firewall and antivirus programs are randomly disabled.
B) The browser’s home page changes unexpectedly.
C) The Apps & features console has programs you do not recognize.
D) The Taskbar or System tray has strange icons.

A

All of the options listed are signs that a computer has been infected with spyware or malware. Other symptoms include:

Search results are being redirected to a strange site.
Computer performance degrades.
New favorites unexpectedly appear in your browser.
The firewall alerts you about an unwanted application trying to access the Internet.
Pop-ups occur even when you are not actively browsing the Internet.
Anti-virus application will not update properly.
The hard drive activity light is always on, even when applications are not running.
The user has an increase in spam email.
A device/user is unable to access the network
False alerts surrounding antivirus protection
Altered system or personal files
Unwanted notification within the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have been sent to clean up a computer that has been infected with malware. When you arrive at the computer, you identify the symptoms that are occurring, quarantine the system, and disable System Restore. Now you must remediate the computer. Which steps are parts of this process? (Choose two.)

A) Schedule automatic system scans and updates in the anti-malware software.
B) Enable System Restore, and create a new restore point.
C) Use scan and removal techniques to clean up the computer.
D) Update the anti-malware software.
E) Educate the end user.

A

You should update the anti-malware software and use scan and removal techniques to clean up the computer as part of remediating the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An IT technician mentions that he finds the REGSVR32 utility useful. For which of the following issues can this tool be used?

A) missing exe files
B) missing BCD files
C) missing dll files
D) corrupt registry

A

The REGSVR32 utility is used to register and unregister dll and ActiveX files in the registry. If a dll file is missing, you should use this utility to register the dll file once it has been replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Users in your department are noticing that their computers are not acting normal. When you ask them to explain, they say that their computers are sluggish and slower than usual. You need to rule out a virus infection. What is the first question you will ask them to help determine whether they have a virus or not?

A) Have you rebooted your computer lately?
B) Have you opened any email attachments lately?
C) Have you run your virus scanning software recently?
D) Have you opened Task Manager recently?

A

You should ask the users if they have opened any email attachments lately. Viruses attached to emails are the most common way to get your computer infected, but there are other ways your computer can become sabotaged, including Trojan horses. The best way to avoid getting one of these nasty viruses on your computer is to NOT open an attachment from someone you do not know or are not expecting an attachment from. Next, users should always scan attachments with virus scanning software prior to opening. Viruses can also be obtained by clicking an infected website link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You suspect that a Windows 10 computer has been infected with a Trojan horse. You need to determine if any Trojan horses are loading at system startup and remove them. Which tool should you use to find out if any Trojan horses are being loaded at startup?

A) Anti-malware software
B) Settings
C) Windows Recovery Environment
D) System Restore

A

If you need to determine if a Trojan horse is loading at system startup, you should use Settings. Then select Apps and Startup. Check each application shown in the list to ensure that it is a valid application you need. As shown in the following exhibit, you can prevent an application from loading at startup simply by turning off the application:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You install an application on a user’s computer. The application requires a connection to a network server to operate properly. The user reports that the application cannot connect to the server. What should you do?

A) Reinstall the application using an administrative account.
B) Configure an application exception in Windows Firewall.
C) Configure the application to run using administrative credentials.
D) Reinstall the application using the user’s account.

A

You should configure an application exception in Windows Firewall. The most likely reason for this problem is that Windows Firewall is not allowing communication between the application and the network server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You need to troubleshoot a driver issue. While using a Windows 10 computer, you enter the Advanced Startup menu after restarting the device. Which option is NOT an option listed in the Advanced Startup menu?

A) System Restore
B) Automatic Repair
C) System Image Recovery
D) Automated System Recovery

A

Automated System Recovery in not an option listed in the Advanced Startup Options menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Luther wants to know a quick way to revive his mobile device battery that has been not holding a charge for as long. What should he do FIRST to keep from having to replace his mobile device?

A) Replace the battery.
B) Place the mobile device into battery-saving mode.
C) Completely drain the battery’s charge, and then re-charge it.
D) Reload the battery app.

A

Luther should first completely drain the battery’s charge and then re-charge it. This may allow the battery life to improve. However, if this does not work to fix the problem, Luther will have to replace the battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You suspect that Alice’s computer is infected with malware by identifying certain symptoms of malware. What is the next step in the malware removal process?

A) Remediate Alice’s computer.
B) Educate Alice on malware.
C) Disable system restore on Alice’s computer.
D) Quarantine Alice’s computer.

A

After identifying malware symptoms, you should quarantine Alice’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A user reports that his computer locks up when he inserts a Secure Digital High Capacity (SDHC) memory card into his memory card reader.

You use the Safely Remove Hardware icon to eject the memory card. You then insert a Secure Digital (SD) memory card that the reader successfully accessed yesterday. However, you cannot access any data on the SD card either.

You need to ensure that the memory card reader is functioning. What should you do?

A) Update the memory card reader’s device driver.
B) Optimize the memory card reader for performance.
C) Reboot the computer.
D) Optimize the memory card reader for quick removal.

A

You should reboot the computer. The memory card reader that is installed in the user’s computer does not support SDHC memory cards. Once the lockup occurs, the memory card reader will not function until the computer is rebooted. After you reboot the computer, you should instruct the user to connect the device that uses the SDHC card to the computer’s USB port to access the data on the SDHC card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Lee is complaining that his Windows 10 computer is having performance issues and is running slower. He wants to clean it up so it will run faster and more efficient. Which built-in tools or settings would you recommend he use first? (Choose all that apply.)

A) Programs and Features
B )SFC
C) Recovery Console
D )Apps & features
E) DEFRAG
F) Disk Cleanup

A

You should recommend that Lee use Disk Cleanup, Apps & features, Programs and Features (or Programs), and DEFRAG.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Susan, a school administrator, has confiscated an Apple iPhone from a student who did not comply with the NO CELL PHONES policy. She needs to quickly turn off the annoying cell phone music and prevent text message notifications. What should she do?

A) Press and hold the Sleep/Wake button until the slider appears, and then slide it to the right.
B) Turn off Bluetooth.
C) Remove the battery.
D) Dim the display.

A

An Apple device can be turned off by pressing and holding the Sleep/Wake button until the slider appears and then sliding it to the right. If she just wanted to silence the phone, she could use the volume buttons on the side of the phone to put the device into vibrate mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are working as a desktop technician in an organization. Adam reports that some unauthorized users are accessing his email messages. He also reports that he received an email from an unauthorized user requesting confidential information about his bank account.

What should you suggest Adam do? (Choose two.)

A) Send the email message in clear text.
B) Request receipt for all outgoing messages.
C) Delete the email message received from unauthorized users.
D) Add an encrypted signature to the outgoing messages.
E) Encrypt outgoing messages.

A

To protect email messages from unauthorized users, you should encrypt the contents and attachments of all the outgoing messages. This will secure the email messages so that only the intended recipients will be able to read them.

When you receive any suspicious email messages, you should delete the email messages without opening them or downloading their attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The organization you work for has updated their mobile device policy to no longer allow employees to use their own devices. Instead, they are mandating that employees use company-provided phones for work-related purposes. Shortly after receiving a new phone, an employee complained that it is continuously rebooting at random times for no obvious reason.

Which of the following might be potential reasons that a mobile device keeps restarting? (Choose all that apply.)

A) Corrupted OS
B) Wireless connectivity drops
C) Overheating
D) Applications that have not been updated
E) Incompatible third-party app

A

Several common causes that can result in a mobile device consistently restarting would be a corrupted operating system (OS), overheating, or incompatible third-party applications. A corrupted OS can be the result of malware that may have been inadvertently installed via a malicious link or from an untrusted application. With a corrupted OS, you will need to repair the operating system by resetting the device to a previous known safe state using a recovery tool.

A mobile device will shut down to prevent its components from being damaged when it overheats. Overheating can be the result of too many applications running at a time, improper charging, or malware.

Incompatible third-party applications can cause random reboots, as the application may not be compatible with the OS of the device. The simplest way to solve this problem is to remove any incompatible applications from the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Thomas tells you that a motherboard manufacturer has suggested that a recent firmware update should be installed to provide additional functionality and increased performance for his Windows 10 computer. What would you tell Thomas to do?

A) Flash the BIOS.

B )Select the Update Driver Software option in Device Manager.

C) Download the new driver and install it in the operating system.

D) Use the System Configuration utility to reboot the computer in
Diagnostic startup mode, and then install the update.

A

Thomas should flash the BIOS. Modern computers store the BIOS as rewritable memory, thus allowing it to be over-rewritten or “flashed.” To start the procedure, search the manufacturer’s website, download the “exe” file and transfer it to a USB flash drive or other bootable media. From there you should reboot your computer into the UEFI control panel and utilize the update or flashing tool to update the firmware. Once this process is completed you should then restart the computer normally. It is highly recommended that you back up your computer before flashing the BIOS. Updating the BIOS is good for fixing bugs, improving performance, and providing support for newly installed hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A user’s computer is infected with malware. You quarantine the infected computer, disable System Restore, and remediate the infected computer by updating the anti-malware software and removing the malware. What step should you complete next?

A )Enable System Restore.

B)Create a restore point.

C) Educate the end user.

D) Schedule automatic scans and updates for the anti-malware software.

A

You should schedule automatic scans and updates for the anti-malware software.

To protect a computer against malware and spyware, it is important to install anti-malware and anti-spyware software. If a computer is infected with malware or spyware, you need to remove it as quickly as possible. Often this is easily done using the anti-malware or anti-spyware application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A user in the local office reports that she cannot access the Internet. You ask her to capture the error message with a screenshot and print it on the departmental printer. When you arrive at her office, she gives the printout to you. No other user in her network is having this problem. What do you need to do to resolve her issue?

A) Apply updates.
B) Update network settings.
C) Repair the browser application.
D) Reimage/reload OS.

A

You need to update the network settings. Because she is the only one having the problem, the problem likely arises from a setting on her computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You install Windows 10 on your computer. Your computer is equipped with a video card and monitor that support a screen resolution of 1024 x 768 pixels at a color depth of 32-bit True Color. You attempt to change the Screen area setting on the Display Properties dialog box from 640 x 480 pixels to 1024 x 768 pixels, but you are unable to change this setting. You determine that Windows 10 is using the generic video graphics array (VGA) driver.

What will enable you to change the Screen area setting to 1024 x 768 pixels?

A) Start your Windows 10 computer in Safe Mode.
B) Replace the monitor connected to your Windows 10 computer.
C) Restart your Windows 10 computer.
D) Install the appropriate device driver for the video card.

A

You cannot change the Screen area setting because Windows is using the built-in, generic VGA driver. When no video driver is installed, Windows will use the generic VGA driver, which only supports the 640 x 480 pixels setting. To update a video card’s driver, you would visit the manufacturer’s website and install video card drivers from there. After you install the device driver for the video card, you should be able to change the Screen area setting to 1024 x 768 pixels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A user has discovered an infected file on his computer. He wants to prevent it from causing any more harm to his computer. From the list below, what should he need to do?

A) Quarantine the file.
B) Disable the firewall.
C) Use the Apps and Features utility.
D) Change the browser’s home page.

A

The user should quarantine the file by placing it on another drive. Then he should use his anti-malware and anti-virus software to scan the file. If he cannot remove the infection, he should delete the file completely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Melissa loves to listen to music while she is working out. However, every time she walks into the gym, her Bluetooth headphones stop working. What could be the problem? (Choose two.)

A) Other WiFi devices are trying to connect.
B) Other Bluetooth devices are trying to connect.
C) Her device is in discoverable mode.
D) Headphones are not charged.

A

The problem could be that other Bluetooth devices are trying to connect or her device is in discoverable mode. When two Bluetooth devices are trying to connect to the same device, either inadvertently or on purpose, Bluetooth will not connect to either. If the phone is in discoverable mode, then any Bluetooth device nearby will attempt to connect. Therefore, Melissa should connect to her Bluetooth headphones prior to coming into the gym and then turn off discoverable mode in settings.

30
Q

Paula recently advertised her older iPhone for sale. What should she do before selling the device?

A) Back up and reset to factory settings.
B) Back up and remove apps.
C) Back up and restore the data.
D) Back up and delete the data.

A

Paula should back up and then reset to factory settings. When selling or giving away an old iPhone, you should perform a factory reset, also referred to as a hard reset, which will basically delete everything on the iPhone (all pics, purchased apps, and data) and restore your phone back to the settings from the factory. Prior to performing a factory reset, you should back up your data so that you can restore that data on your new device using iTunes. For an Android device, this is referred to as restoring to factory settings.

31
Q

Clara took her son swimming and left her mobile device in the sun for too long. What can she do to get the mobile device to turn on again?

A) Replace the battery.
B) Remove the protective cover, and place the phone in a cooler environment.
C) Re-install the OS.
D) Turn off Bluetooth.

A

To get the mobile device to turn on again, Clara needs to cool it by removing the protective cover and placing the phone in a cooler environment.

Overheating will cause major damage to a mobile device. Addressing it must be a priority when a device reaches high temperatures. Devices must not be too warm or too cold. Most devices will warn you they are not protected and disable themselves until you place them in a comfortable temperature. You should avoid exposing them to direct sunlight and extremely cold conditions on a regular basis. Users are putting their device and data at risk when they expose the device to extreme temperatures.

32
Q

Andrea is in an airport waiting for her flight to take off and preparing for her work presentation. Although the airport offers free WiFi, she uses her iPad to edit her presentation and tethers it to her iPhone’s personal hotspot. Why is this most likely a good practice?

A) possibility of leaked personal files and data
B) slow data speed
C) no Bluetooth connectivity
D) no wireless connectivity

A

This is most likely a good practice because of the possibility of leaked personal files and data that can occur over a free public WiFi network. By tethering to the iPhone’s personal hotspot, you provide an extra layer of security. Unintended connections can cause unauthorized users to access data on your device. Therefore, policies should be put in place to prevent this. You might also want to implement mobile security software on the mobile device.

33
Q

Ever since Daniel upgraded his operating system to Windows 10, some of his programs from Windows XP do not load properly. What does he need to do?

A) Set up a Windows XP Virtual Machine.
B) Roll back the drivers.
C) Restore a system restore point.
D) Re-install the programs.

A

Daniel needs to set up a Window XP Virtual Machine. To operate Windows XP on a Windows 10 device, he will need a valid Windows XP product key. With that key, Daniel can download a virtual machine and successfully run Windows XP and Windows XP applications.

34
Q

Shelly was in the workout room listening to her music via her Bluetooth headphones on her iPhone X which was in her pocket. Later she went into the sauna, where she noticed her music stopped playing even though the iPhone was located in a pocket of her robe she was wearing. What most likely happened?

A) Lost Bluetooth signal
B) Lost WiFi signal
C) Headphones lost power
D) iPhone overheated

A

Most likely Shelly’s iPhone overheated in the sauna. iPhones in general will overheat when you are working it too hard (downloading lots of apps as well has running apps in the background) or when it is placed in a high-temperature area.

Overheating will cause major damage to a mobile device. Most devices will warn you and disable themselves until they have time to cool down. Avoid direct sunlight and extremely cold conditions on a regular basis. To avoid overheating, charge your mobile device properly and with vendor-approved plugs. Store the device in a cool, sheltered location. Look for cover if in direct sunlight. Finally, you might want to download the app Coolify. This app prevents your mobile device overheating by continuously monitoring the environmental temperature and modifying the mobile device’s systems accordingly, particularly during intensive internet use or when you use a heavy-duty app. A side effect of Coolify is increased battery life.

35
Q

Recently, you upgraded a user’s computer to a dual-core processor. The user complains that an application’s performance did not increase after the upgrade. You need to ensure that the application fully utilizes the dual-core processor. What should you do?

A) Enable multithreading in the operating system.
B) Upgrade the application to a version that supports multithreading.
C) Upgrade the operating system to a version that supports multithreading.
D) Enable multithreading in the BIOS.

A

The only way an application can fully utilize a dual-core processor is to support multithreading. The solution is usually as simple as upgrading to a version of the application that supports multithreading. You do not need to upgrade the operating system. This would only ensure that the operating system fully utilizes the dual-core processor, not the application.

36
Q

You upgrade a device driver on your Windows 10 computer and reboot. After logging in, you notice that the device does not perform. How do you go back to the older version of the driver that you had installed on your computer?

A) Disconnect and reattach the device.

B) Go to the manufacturer’s Web site to
get previous version of the driver.

C) Use Device Manager to roll back to the previous version of the driver.

D) Use the Last Known Good Configuration.

A

You should use Device Manager to roll back to the previous version of the driver. In Windows 10 and higher, you can roll back to a previous version of the driver if the new driver fails. Enter Device Manager in the search bar, open it, then select the arrow to expand the device section. For example, if the issue was with a display driver, you would choose the Display adapters section. Right-click your display adapter and select Properties and the Driver tab, and then select Roll Back Driver. If you don’t see a roll back option, you should reinstall your display driver.

37
Q

You have recently installed the latest version of Microsoft Edge on a Windows 10 computer. You want to prevent fraudulent Web sites from gaining access to your personal information through Microsoft Edge.

What should you do?

A) Turn on the pop-up blocker.

B) Reset the security level for the Local Intranet zone to High.

C) Turn on the SmartScreen filter.

D) Reset the security level for the Internet zone to High.

A

You should turn on the SmartScreen filter to prevent fraudulent Web sites from gaining access to your personal information through Microsoft Edge. Enabling the filter provides protection against threats of accessing your personal information such as your passwords without your consent. The filter will scan and inform you about the Web site status, such as whether the Web site is suspicious. It also prevents you from sharing your personal information on Web sites that are recognized as fraudulent Web sites. The best way to prevent a phishing attack is to educate the end user.

38
Q

You have just removed malware from a Windows 10 system. But every time you type a URL into your browser to navigate to a search engine, the same page is displayed. After researching the issue, you realize that the computer has been infected with the PUM.bad.proxy malware.

Select the steps that could be used to resolve the malware infection. Only use those steps that will fix the problem.

On the Connections tab of the Internet Properties dialog box, click LAN Settings. In the LAN Settings dialog box, clear the Use a proxy server for your LAN checkbox.

Edit the ProxyServer and ProxyEnable registry keys in the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings hive.

A

The other two settings will not have any effect on the PUM.bad.proxy malware.

39
Q

You open Device Manager and notice a red X next to your wireless network adapter. What does this indicate?

A) The adapter is experiencing a resource conflict.

B) The adapter’s drivers need to be reinstalled.

C) The adapter is disabled.

D) The adapter was not installed properly.

A

A red X next to a device in Device Manager indicates that the device is disabled. You could also see a black down arrow in a circle, depending on the operating system version you have.

40
Q

You are a desktop engineer for a graphic design company. The network consists of fifteen Windows 10 client computers. Several users report that the performance of the computers is degrading. You detect that there is low free disk space on the computers. To enhance the performance of the computers, you instruct the users to back up the data and remove unwanted applications that are installed on the computers to free up disk space.

What else should you instruct the users to do? (Choose two.)

A) Run the Action Center utility.

B) Run the Disk Cleanup utility.

C) Run the Scheduled Tasks utility.

D) Run the Files and Settings Transfer Wizard.

E) Run the Disk Defragmenter utility.

A

You should instruct the users to run the Disk Cleanup and Disk Defragmenter utilities to enhance the performance of the computers. The Disk Cleanup utility is typically used to delete unwanted or unused files on a computer. This utility helps you to free up space on the hard disk drive. The Disk Defragmenter utility is used to organize noncontiguous files into contiguous files, resulting in the increase in overall performance of a computer. You can also use the DEFRAG.EXE command from the command prompt or a script file to defrag a hard disk.

You should be familiar with these parameters of the defrag.exe tool:

-a – analyzes only (does not actually defragment the hard drive)
-v – verbose output

41
Q

You are a network administrator. Your company recently gave employees new mobile devices for business use only. Shortly after this policy was rolled out, an employee complained that their device has been slow to respond and has already used almost all their reallocated monthly cellular data plan. What are these issues most likely representative of?

A) The device has become infected with malware.

B)The device is faulty and needs to be replaced.

C)The user has jailbroken the device.

D)The user has unlocked developer mode.

A

The device has most likely become infected with malware. When a device becomes infected with malware, it can become unresponsive, behave unexpectedly, and utilize data on its own as the malicious actor is engaging it without the user’s knowledge. Malware is often installed when a user clicks a malicious link or downloads a malicious application. To remove malware, users should install a robust anti-malware software.

42
Q

You manage a computer network that contains several Windows 10 computers. A user complains that he installed an application recently and now his computer is very slow. Your attempt to uninstall the application failed. You want to undo the application installation with the least administrative effort. What should you do?

A)Run Disk Cleanup.

B)Run System Restore.

C)Run Registry Checker.

D)Edit Windows Registry.

A

You should run System Restore to resolve the problem. System Restore is a built-in restore program in Windows operating system that enhances the ability to restore the system to an earlier state. Whenever you make any changes to the system, such as installing a new software program and it does not allow the system to boot to normal mode of Windows or it does not allow the system to perform at its normal speed, then you can run Windows System Restore program to resolve the problem. With System Restore, you can choose the date to which you want to restore the system. You can also run System Restore program from Windows Safe Mode boot operation if you are unable to boot from normal mode.

43
Q

A user named Mary reports receiving a “Service failed to start” error message every time she restarts her Windows 10 computer. Which utility should you use to determine which service is failing to start?

A)Performance Monitor
B)This PC
C)Task Manager
D)Event Viewer

A

The Event Viewer is used to view the system log. With Event Viewer, you can also view the security and application logs. Many different display options are available in Event Viewer. You can list logged events showing the newest or oldest events first, define a time range of events to view, and filter events displayed by type. To see the contents of Event Viewer, click type Event Viewer in the search bar.

44
Q

A user reports that an app that has worked fine in the past will no longer launch. He indicates that he closed out the app and then turned off and back on the device. What should you suggest that he do NEXT?

A) Perform a soft reset.
B) Perform a factory reset.
C) Force stop the app.
D) Uninstall and then reinstall the app.

A

You should suggest that the user uninstall and reinstall the app. If the app still has performance problems, you will have to contact the app vendor.

45
Q

A user is receiving an error when his Windows 10 computer boots. When you troubleshoot the problem, you discover that the computer is attempting to start an application that has been removed from the computer.

You decide to prevent the error from occurring by disabling the application in the System Configuration utility (msconfig.exe). Which tab should you access?

A)Startup
B)General
C)Services
D)Tools

A

You should access the Startup tab of the System Configuration utility (msconfig.exe). This tab contains a redirection to Task Manager. All applications that load at startup can then be examined on the Startup tab of Task Manager. You can then Disable applications that load at startup from the Task Manager tab.

The General tab allows you to select the startup type to use at the next computer boot. The options are Normal Startup, Diagnostic Startup, and Selective Startup. Diagnostic Startup loads basic devices and services. Selective Startup allows an administrator to select which startup components to load at the next computer startup. This exhibit shows the General tab and the startup selection choices that you have available:

46
Q

Deborah has a brand new iPhone that she thinks is defective because it keeps losing battery power. What are three easy fixes she can do herself without having to take it in for technical service? (Choose all that apply.)

A)Turn on Bluetooth.

B)Place in Airplane mode.

C)Turn on WiFi.

D)Dim the display.

E)Close out background apps.

A

Dimming the display, closing out background apps, and placing your device in Airplane mode are just a few tips that will save Deborah’s battery.

47
Q

While teaching a class, David mentions that Windows no longer includes the boot.ini file. Which file is used in its place?

A)bootmgr
B)NTLDR
C)BCD
D)ipconfig

A

The Boot Configuration Data (BCD) file is the file that replaced the boot.ini file. The boot.ini file was used in Windows XP and earlier, and the BCD file was used in Windows Vista and later. The BCD holds configuration data about which operating systems are installed. You cannot copy a BCD file from another computer and expect it to work properly. The MSCONFIG utility is used to edit the BCD file. You can also use BCDEdit.exe in Windows 7 and later.

48
Q

Alan of Northern Company is travelling to several conferences in various states to present his new product line to consumers. When he left the last site, he packed the SlimPort he uses to project from his Android, but forgot his other cables.. His next presentation is in four hours. What can he request from the hotel technical team to keep the show rolling for Alan? (Choose two.)

A)an HDMI cable
B)a mini USB cable
C)a Micro HDMI cable
D)a Miracast or Chromecast

A

Alan should request an HDMI cable, which will connect to his Slimport device or a Chromecast or Miracast.

49
Q

Sam is delighted with his new Android phone. However, one of the apps causes performance issues with the other apps almost every time he launches the app. What does he need to do with this app when this happens?

A) Perform a hard reset.
B) Adjust device settings.
C) Perform a force stop.
D) Perform a soft reset.

A

Sam should force stop the app, which means manually turning off the application’s running processes through Settings > Apps. Keep in mind, however, that force stopping may lose app data in memory at the time of use so only do this if you feel it is necessary or the app is causing your system performance problems.

50
Q

An employee brings you their company-provided Android mobile device complaining that it is not functional and their applications are not responding. During your investigation of the device, you find that the device has been modified to circumvent restrictions and give the user root access. What is most likely the cause of this security concern?

A) Unlocked developer mode
B) Jailbreaking
C) Installation of bootleg applications
D) A corrupted Android Package (APK)
source code

A

Jailbreaking occurs when a user tampers with a device to remove the restrictions that were put in place by the manufacturer or operator to prevent a user or malicious actor from installing unauthorized software. Jailbreaking is a privilege escalation exploit that is often done through a series of kernel patches. It is seen as violation of many end-user licensing agreements, and creates multiple vulnerabilities within the device.

51
Q

Elizabeth has given her teenage son an iPhone for his birthday. She has enabled all the services required to use the Find My iPhone feature. Which security risk may occur as a result?

A) slow data speeds

B) unauthorized location tracking

C) unintended Bluetooth connection

D) unintended WiFi connections

A

As a result of enabling all the services required for the Find My iPhone feature, unauthorized location tracking may occur. The Find My iPhone feature requires location services to be turned on. While location services allow the device to be tracked, it can also be used by unauthorized users to compromise the device.

52
Q

Aaron is using Microsoft Excel on his portable computer, and reports being unable to move the cursor from one cell to the other cell with the arrow keys. Aaron also confirms that he is able to use the mouse to move the cursor from one cell to the other cell.

What is the reason for this cursor issue?

A) The application is corrupt.
B) The Shift key is pressed.
C) The Num Lk is on.
D) The Scroll Lk is on.

A

Aaron is not able to use the arrow keys to move the cursor from one cell to the other cell because the Scroll Lk (Scroll Lock key) is on. Scroll Lk modifies the behavior of arrow keys. When the Scroll Lk is on, the arrow keys will scroll the contents of a text window instead of moving the cursor.

53
Q

Your mobile device is fully charged. You have been travelling all day using your mobile device to make calls. However, when you travel into remote areas, calls mysteriously disconnect. What is the most likely problem with the device?

A) Signal drop/weak signal
B) Slow data speeds
C) High resource utilization
D) Power drain

A

The most likely problem with the device is signal drop/weak signal. You should evaluate the strength of the signal on your device before you begin a call. All devices have indicators denoting signal strength. A low signal or battery could easily result in a dropped call. To get a better signal, try to make calls near windows or outdoors as much as possible. You could use a cell tower analyzer for additional details on signal strength. Also, many manufacturers have devices that claim to boost signal strength.

54
Q

Hannah is having issues with her new headphones directly connected to her mobile device. She cannot hear anything even though she is connected. What is the first thing she could do to troubleshoot this problem?

A)Check Bluetooth connectivity.
B)Check the headphone connection.
C)Check WiFi connectivity.
D)Check the headphone volume.

A

Because the headphones are directly connected to her mobile device, Hannah should check the headphone volume. More than likely the headphone volume has been turned down.

55
Q

A user has a Windows 10 computer with 8 GB of RAM and two hard drives, named drive C and drive D. The paging file is located on drive C.

The user complains that his computer does not perform well after running for a couple hours. What should you tell the user to do?

A)Disable the paging file.
B)Increase the size of the paging file.
C)Defragment the hard drives.
D)Move the paging file to drive D.

A

Because the performance problem occurs after the computer has been running for a while, the problem is probably with the paging file. You should tell the user to move the paging file to drive D.

56
Q

Susan is constantly shutting down her laptop improperly due to moving from meeting to meeting. Which file is in jeopardy of being affected the most?

A) system restore points
B) BCD file
C) registry
D) dll file

A

The registry is in jeopardy of being affected the most. When you shut your computer down improperly, you are putting the registry, as well as your software, in danger of becoming corrupt. While newer operating systems are designed to handle this better, it is still not recommended and should only be done when necessary, such as when a computer freezes. When the computer freezes, the registry files will stop operating and any open documents or other software files will be lost.

57
Q

A user has a computer that is able to boot into Windows 8 and Windows 10. The user has requested that you change the default boot operating system to Windows 10. Which tool should you use to do this?

A) boot.ini
B) taskmgr.exe
C) bcdedit.exe
D) regedit.exe

A

You should use the bcdedit.exe utility to edit, modify, and update the Boot Configuration Data (BCD) file, which contains the boot settings for a computer.

58
Q

You want to decrease the amount of time it takes for a Windows system to get through an entire boot process. You also want to ensure that the user has the largest possible amount of RAM available. What should you do?

A) Disable Windows services/applications.

B) Disable application startup.

C) Rebuild WindoIt diws profiles.

D)Use safe boot.

A

You would disable application startup. This would prevent applications from automatically starting during the boot process, decrease the amount of time required for bootup, and free up the largest amount of RAM.

59
Q

George contacts the help desk inquiring why his mobile apps will not load on his Android device. He states that they just stop responding while he is using them. What should he do?

A) Call the device’s tech support.

B) Delete all apps.

C) Restart the device and check for
system updates.

D) Restore the device to its factory settings.

A

He should restart his device and check for system updates. Another option would be to stop all apps from running and try to launch all the apps again. Sometimes an app freezes because another app is interfering with it. If the app continues to have problems, the next logical choice is to clear the cache and then remove and reinstall the app. You might want to also check that you have all updates for the app installed. If there are still problems, then you will want to advise him to contact the app developer.

If an app does not load on the first attempt, try rebooting the device or do a force restart. If that does not work, try downloading the app again and make sure it is updated. Some apps are not compatible with certain operating system versions.

Calling the device’s tech support should be the final step after you have exhausted all efforts given in the previous paragraph.

60
Q

Ten computers in your department need the BIOS updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish this task?

A) Flash the BIOS.
B) Use a bootable flash drive.
C) Update the EEPROM chip.
D) Use a boot loader file.

A

To start the procedure, search the manufacturer’s website, download the “exe” file and transfer it to a USB flash drive or other bootable media. From there you should reboot your computer into the UEFI control panel and utilize the update or flashing tool to update the firmware. Once this process is completed you should then restart the computer normally. It is highly recommended that you back up your computer before flashing the BIOS. Updating the BIOS is good for fixing bugs, improving performance, and providing support for newly installed hardware.

61
Q

You are instructing your company’s IT technicians on how to calibrate the screen of a touch screen device. The technicians will need to perform this step only in certain conditions. Which conditions will require this? (Choose all that apply.)

A)battery dies
B)incorrect application opens
C)nothing happens when touching an application
D)dirty screen

A

If an incorrect application opens or if nothing happens when touching an application, the user should calibrate the touch screen. In most cases, the device has an embedded touch screen calibration application that can be used to calibrate the screen. This ensures that touches are accurately registered by the touch screen and result in the correct application being launched.

62
Q

Tina traded in her old iPhone for a newer version. However, soon after she got it, she started receiving notices from her carrier that she had exceeded data limit. What should she do to eliminate this problem?

A)Disable iCloud.
B)Install a WiFi analyzer.
C)Disable Google Sync.
D)Install a cell tower analyzer.

A

She should disable iCloud. When iCloud data syncing is turned on, you are uploading all the documents and data stored on your phone for all the applications to iCloud. This also drains the battery much quicker. Depending on which device and operating system you have, you will be able to back up and restore your mobile device’s data to One Drive, Google Sync, or iTunes/iCloud/Apple Configurator. You should regularly back up your mobile device.

63
Q

Barry wants to keep his data secure on his Android device. Which feature should you advise him to use?

A)encryption
B)PIN lock
C)screen swipe
D)password lock

A

You should advise him to use encryption. Encrypting your data that is stored on your phone is very wise as it scrambles your data making it unreadable.

64
Q

Isaac purchased a refurbished iPhone and installed the latest version of iOS. However, his iPhone will not hold a charge for very long. What can you recommend he try so he can alleviate his extremely short battery life?

A)Delete some apps.
B)Use the Low Power Mode setting.
C)Enable WiFi.
D)Use the battery usage report.

A

Using the Low Power Mode will reduce the power required to run the iPhone to make its battery last longer. Apple has made claims that the Low Power Mode setting will give you three extra hours of battery. This is not a feature that is turned by default, but must be enabled to run. It will turn itself on when you hit 20% remaining battery power.

Using the battery usage report can produce facts about battery use. However, it cannot alleviate an extremely short battery life.

Deleting some apps would free up drive space on your mobile device, but will not actually lengthen battery life. However, shutting down apps that are running in the background will lengthen battery life.

One of the biggest drainers of a battery on a mobile device is the WiFi antenna, which is constantly checking for a nearby cellular signal and Wi-Fi networks. When you move around with your phone in your pocket, its constant updates will drain your battery. It is recommended that if you do not need to access data, set your phone on Airplane Mode. It is a fairly easy process as you swipe up Control Center and tap the airplane icon on the top left. Alternatively, you can go to Settings and set Airplane mode to On.

65
Q

A user contacts you stating that he believes that his computer is infected with malware. Which symptoms may indicate that he is correct? (Choose all that apply.)

A) browser redirection
B) junk email
C) low disk space warning alert
D) pop-ups
E) slower performance
F) security alerts

A

The following symptoms may indicate that a computer is infected with malware:

pop-ups
browser redirection
security alerts
slow performance

Another browser related symptom that you will need to be aware of for the A+ exam are certificate warnings. Certificate warnings are used to notify a user that the site they are attempting to access has a certificate that is either invalid or is not recognized. The purpose of these messages is to warn a user about a potentially malicious site that may be attempting to collect personal information or install malware. However, errors can occur where valid sites are not recognized and are flagged as dangerous. If this error occurs, the user can either set the site manually as a genuine safe site or download the impacted site’s security certificate themselves.

A low disk space warning alert is not generally a symptom of malware infection. The minimum amount of hard drive space for optimal performance is 200 MB.

Junk email is not usually a sign of malware infection.

66
Q

Michael runs a mobile devices repair business and is responsible for keeping up to date with all mobile devices. What is one of the top common software issues he can expect to see on a regular basis?

A) dead battery
B) missing cables
C) cracked screens
D) no Bluetooth connectivity

A

No Bluetooth connectivity is a common software issue that will be seen on mobile devices. Many users will complain about no Bluetooth connectivity because they do not take the time to educate themselves what Bluetooth really is and how it works. Bluetooth is basically a small network feature that allows users to connect to Bluetooth devices such as headphones, speakers, cars and other devices that have Bluetooth enabled. One of the fastest ways to troubleshoot Bluetooth complaints or issues is to have the user turn it off and back and on again. You should also make sure that the two devices that need to be paired are in close proximity. Discoverable mode must be turned on. You should also see if there are any devices in the area that can be interfering with the pairing. Finally, you may have to download a new driver or the latest firmware.

67
Q

Lucy has all Android devices. She has recently read an article about apps that have malicious intent that can be inadvertently installed on mobile devices. What should you recommend she do?

A) Force stop all apps.
B) Set up antimalware.
C) Perform a factory reset.
D) Scan the apps.

A

You should recommend that she set up antimalware. Antimalware scans the mobile device and its apps for malicious software. The antimalware software is periodically updated to ensure it protects against the latest malware.

68
Q

A user reports that her mobile device is not working properly. When you research the issue, you discover that she accidentally deleted all the data on her device. What has most likely occurred?

A)soft reset
B)factory reset
C)data backup
D)force stop

A

Most likely a factory reset has occurred on the device. When a factory reset occurs, all personal data on the device (all contacts, photos, music, purchased apps, and other data) is deleted from the device. The only way to recover is to restore the data from backup.

69
Q

A user has recently upgraded the video adapter drivers on a Windows 10 computer. Since that time, the computer has been continuously restarting. What could you do to fix the problem using the least administrative effort? (Choose two.)

A)Restart the computer in Safe Mode.

B)Restart the computer and press the

F8 key to enable the Command prompt only option.

C)Open Settings > Recovery and choose Reset this PC.

D)Roll back the video adapter drivers.

E)Perform a fresh installation of Windows 10.

A

You should do the following to troubleshoot the problem:

Restart the computer in Safe Mode.
Roll back the video adapter drivers.

The computer is continuously restarting because the user installed the video adapter drivers, so you need to roll back the drivers for the video adapter. To do so restart the computer through the recovery settings and then reboot in Safe Mode from the selection options, and then use the Device Manager snap-in to roll back driver software for the video adaptor. You can also use Safe Mode to uninstall an application if the computer will not boot properly after the application is installed. You can also enter Safe Mode from the Windows logo screen by pressing and holding the Shift key while you select Power > Restart.

70
Q

You are running several applications simultaneously under Windows 10 when performance begins to slow down. What can you do to fix the problem without powering off the machine?

A)Decrease the size of pagefile.sys.

B)Increase the size of pagefile.sys.

C)Decrease the size of WIN386.SWP file.

D)Increase the size of the WIN386.SWP file.

A

In Windows 10, the virtual memory page file is pagefile.sys. It is used as a temporary storage area for data when main memory capacity is exceeded. Increasing the size of this file increases the available storage area and improves system performance.