Software and Trouble Shooting: troubleshoot common personal computer (PC) security issues Flashcards

CompTIA A+ Core 2 Exam Criteria

1
Q

What steps can you take to remediate a problem - when you can’t access the Network? (Network Access Issues)

A

Check network connection settings

Example: Settings > Network & Internet > Change adapter options > Right-click the Etheret Icon > Choose Status

Check if you have an APIPA address > 169.254.13

Two network adapaters one APIPA or Static IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should you do immediately for desktop alerts?

A

Check antimalware software

Example:Right click window icon> Settings > Update & Security > Windows Security > Open Windows Security > Virus and threat protection > Protection history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can you do remediate false alerts?

A

False alerts regarding antivirus protection

Virus and Threat protection (via settings) > Scan options > Allowed threats

Create exceptions

Set specific Exclusions via Virus and Threat Protection (use sparingly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can you do to remediate altered or missing files?

A

Restore files from backup via File History (use an anti-malware scan first)

Example: Settings > Update & Security > Backup > Backup files using File History > + Add Drive

Example: Settings > Update & Security > Backup > Backup files using File History > More Options

Youcan also find this in Control Panel > System and Security > File History (Windows 11)

You can restore files from current back up at the bottom of the window

You can use cloud to use centralize management and download file from cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you fix unwanted notifications within the OS?

A

Check Event Viewer for potential issues

Example: Right-click on the Start Icon > Event Viewer > Windows Logs > Select system > now you can view error logs

Configure notification settings

Example: Right click windows icon> Settings > Update & Security > Windows Security > Open Windows Security > Settings > Notifications > Manage Notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you remediate OS Update Failures?

A

Verify network connections

Incorrect Windows Update settings

Example: Settings > Update & Security > Windows Update > Advance Options

Check drive space

Example: Launch File Explorer > This PC > Right-click Local Disk C: > Choose Properties – Increase storage for available space for updates.

Free up drive space

Example: Launch File Explorer > This PC > Right-click Local Disk C: > Choose Properties > Disk Cleanup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Browser-Related Symptoms?

A

Random/frequent pop-ups

Browser uninstall/reinstall

Browser Reset

Example: Launch Microsoft Edge from Taskbar > Ellipsis > Settings > Reset Settings

Certificate warnings

Example: https://badssl.com/

Example: https://www.eicar.org/?page_id=3950

Redirection

Enable App & browser control in Windows Security

Example: Settings > Update & Security > Windows Security > Open Windows Security > App and Browser Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can you do to stop Annoying-Pop ups?

A

Pop-ups – This issue may not necessarily be a security issue because pop-ups (and pop-under) are often benign. The biggest issue with them is often their annoyance. Most Web browsers have a built-in pop-up blocker that can be enabled. In cases where pop-ups should not be blocked, an exception can be configured for certain Web sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you avoid Browser Re-direction?

A

Browser redirection – This issue occurs when code changes have been made to your Internet Explorer settings or your registry. To prevent this problem, avoid any Web sites with which you are unfamiliar. Also make sure to keep your anti-virus software updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Best Practices for PC/OS Lock ups?

A

PC/OS lockup – Often malware consumes so much resources that a computer locks up. You may have to use Task Manager to stop the process that is causing the lock up or, in the worst cases, reboot the system. Make sure to scan for malware once the computer is no longer locked up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What setting should you check of OS Update Failures?

A

OS Updates failures – Often malware is configured to disable Windows Updates (or other OS update features) and anti-virus software. This is a problem because most computers have configured Windows Updates and anti-virus updates to be performed automatically. If you discover that Windows Updates or the anti-virus application has been changed in any way, you should scan for malware. Once the malware is removed, you should then change the Windows Updates and anti-virus settings back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are best practices to avoid rogue-antivirus?

A

Rogue antivirus – This often occurs when a user is at a non-trusted Web site and receives a message stating that the computer is infected. This message includes a free offer to clean the system. Sometimes these offers are just marketing ploys used to sell legitimate anti-virus applications. Other times, however, these links infect the computer with malware. Ignore these messages when they occur. If a user has clicked one of these messages, make sure to remove the rogue anti-virus application as it can interfere with other legitimate anti-virus applications. Also, you should scan for malware and anti-viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you do immediately when you have increasingly alarming amount of SPAM?

A

Spam – If you experience a sudden increase in spam, your spam filter could have been disabled by malware. Also, some malware actually monitors your activities so that targeted spam can be sent to your account. As with many of the other security issues, scanning for malware can stop this from occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the evidences of email hijacking?

A

Hijacked email – This is usually caused by viruses. Make sure your anti-virus application is updated, and scan for viruses. Two examples of evidence are responses from users regarding email and automated replies from unknown sent mail. If users report these issues, it is likely that their email has been hijacked. Evidences of email hijacking include:

Responses from users regarding email

Automated replies from unknown sent email

Access denied – This is usually caused by file permission changes and should be treated in the same way. However, if it is associated with Internet access, you should check the configuration of your firewall. If it is a specific Web site for which you have a user account, it could be that your account settings have been changed by a hacker. Contact the site administrator to report the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly