Software Troubleshooting (1) Flashcards

1
Q

Your network has 24 Windows 8.1 workstations. The office manager is concerned about spyware. What does Windows 8.1 come with, if anything, that will help thwart spyware?

Windows Firewall

Windows Defender

Windows Anti-malware

A

Windows Defender

There are many other forms of malware in addition to viruses. While a true antivirus program will scan for viruses, anti-malware programs are a superset of virus scanners and will look for more than just traditional viruses. One program included with Windows that falls into this category is Windows Defender, which is mainly a spyware detector (and incorporates Microsoft Security Essentials, or MSE, with it as of Windows 8 and later)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An iPhone user calls to report that his phone has no wireless connectivity. What is the first thing you should tell him to do?

Turn the phone off and back on.

Perform a reset to the factory default.

Check whether airplane mode is on.

A

Check whether airplane mode is on.

A common cause for lack of wireless connectivity is for a device to be in airplane mode. Make sure the device is not in that mode, and do a hard reboot if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Windows 7 workstation will not boot properly. Instead, there is an error message stating that there is no OS found. How do you fix this problem?

Boot to the installation DVD, open a command prompt, and type Startup Repair.

Boot to the installation DVD, open SFC, and choose Startup Repair.

Boot to the installation DVD, open System Recovery Options, and choose Startup Repair.

A

Boot to the installation DVD, open System Recovery Options, and choose Startup Repair.

If the operating system is missing, it could be due to a bad or corrupt boot sector on the hard drive, or the operating system may indeed be missing. If the hard drive is actually OK, then use the installation DVD (you may have to set the BIOS to use the DVD drive as your primary boot device) or the Windows Repair CD. In Windows 10, Windows 8/8.1, and Windows 7, go to System Recovery Options and choose Startup Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have a user with an iPhone, and the device appears to be locked up. You need to tell him how to perform a hard reset. What do you tell him?

Press and hold the Sleep/Wake and Home buttons for at least 10 seconds until you see the Apple logo and then let go.

Press and hold the Sleep/Wake button until the red slider appears and then drag the slider to power off the device.

Use a paperclip or pen point to press and hold the indented reset button on the bottom of the phone until you see the Apple logo and then let go.

A

Press and hold the Sleep/Wake and Home buttons for at least 10 seconds until you see the Apple logo and then let go.

If the system is unresponsive, then a soft reset will not work. A hard reset is the next choice. With Apple’s iPhone, iPad, and iPod Touch, forcing a restart on the device is done by pressing and holding the Sleep/Wake and Home buttons for at least 10 seconds until you see the Apple logo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your company purchases a custom database software package from an outside vendor. You install the client software on a Windows 10 workstation, and it crashes when you try to open it. You remove the software and reinstall it, but it still crashes when you open it. What should you do next?

Run an antivirus remediation on the workstation.

Contact the vendor to see whether an update or patch is available.

Delete and reinstall Windows.

A

Contact the vendor to see whether an update or patch is available.

When an application crashes, you want to isolate the cause of the crash—it could be a compatibility issue, hardware, or a host of other problems—and solve it. One step to take early on is to look for updates/patches/fixes to the application released by the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On your MacBook Pro, you use the Safari browser to surf the Internet. Yesterday a friend borrowed your laptop. Today, when you try to browse the web, no matter what site URL you type in to the address bar, you are sent to a different website. What is most likely happening to your computer?

A practical joke by your friend

Browser redirection

Rogue antivirus

A

Browser redirection

This is a classic symptom of browser redirection. The perpetrator has one goal, which is to direct you to websites that he wants you to visit, regardless of what you actually want to see. Removing the redirector might be as simple as uninstalling an application (by dragging it to the Trash and emptying the Trash), or it might require full-scale virus (malware) mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Windows 8.1 workstation boots with this error message: “Security Center service cannot be started.” You try to start the service manually, but it still refuses to start. What should you do to try to fix the issue?

Use automated system recovery to fix the service.

Run REGSVR32 to fix the issue.

Run SFC /SCANNOW to fix the issue.

A

Run SFC /SCANNOW to fix the issue.

If the service refuses to start, even manually, it is possibly corrupt. (It is also possible that you have malware, but we’ll focus on it being corrupt first.) The system file checker (SFC) utility can fix the key system files needed to run this Windows service. If that doesn’t fix it, then follow the steps needed to mitigate malware, or reinstall Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user has an iPhone and has forgotten the passcode. He has entered in the passcode several times, and it will not unlock. He turned the phone off and back on, and the passcode is still invalid. What can he do to unlock the phone?

Perform a reset to the factory default.

Crack the phone using a back door from Apple.

Perform a hard reset.

A

Perform a reset to the factory default.

Unfortunately, the only solution to a locked phone (or system lockout) is to perform a reset to factory specifications. That means that all the data on the phone is gone, unless it was synced with iTunes or iCloud (or the appropriate Android equivalent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You want to display the contents of your iPad on a full-sized computer monitor. The monitor has a DVI connector. What do you need to do?

Plug the monitor in to the iPad’s DVI port.

Purchase a USB to DVI adapter.

Purchase a Lightning to DVI adapter.

A

Purchase a Lightning to DVI adapter.

iPads and iPhones are not large enough to have external DVI or other video ports. If you want to project to an external monitor, you need an adapter or an app that will allow you to broadcast to the monitor over Wi-Fi or Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are troubleshooting a Windows 10 workstation that could have malware on it. To follow the best practices for malware removal, what is the first step you should take?

Update the anti-malware software.

Enable system restore and create a restore point.

Identify malware symptoms.

A

Identify malware symptoms.

The best practices for malware removal is a seven-step process. Identify malware symptoms, quarantine the infected system, disable system restore (in Windows), remediate infected systems (including update anti-malware software and scan and remove the malware), schedule scans and run updates, enable system restore and create a restore point (in Windows), and educate the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recently, users on your company network have been flooded with unrequested emails trying to sell them goods and services. Which solution will most likely resolve this issue?

Install antivirus on all client computers.

Install a spam filter on the email server.

Renew the invalid certificate on the email server.

A

Install a spam filter on the email server.

Spam is defined as any unwanted, unsolicited email, and not only can the sheer volume of it be irritating, it can often open the door to larger problems. While spam is not truly a virus or a hoax, it is one of the most annoying things with which an administrator must contend. Installing or enabling a spam filter on the email server is the best solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your network has several dozen mobile device users. Several of them have reported that there are areas within your office where network access is very slow. What can you use to test wireless access?

Wi-Fi analyzer

Cell tower analyzer

Data transmission analyzer

A

Wi-Fi analyzer

A Wi-Fi analyzer can be used on your network to see signal strength, channels used, and various other network metrics. Any company with a wireless network should have one for troubleshooting purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You just installed a new sound card in a Windows 7 workstation. Now, the computer has crashed and given you a blue screen of death. You turn the computer off. What should you try to resolve the issue?

Boot to the Windows installation CD and start the Recovery Console.

Boot to Safe Mode and uninstall the sound card driver.

Remove the sound card from the computer and reboot.

A

Boot to Safe Mode and uninstall the sound card driver.

The first rule with BSOD errors is to reboot. If the problem goes away, it could have just been a one-time problem. But since you just installed the sound card, it’s most likely the sound card driver that caused the issue. Reboot into Safe Mode and uninstall the driver. After you reboot again, look on the manufacturer’s site for an updated driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An iPad user reports that when he is in a certain part of the building, his wireless connection intermittently drops. What are the two most likely causes of this? (Choose two.)

Poor wireless buffering in the iPad

Interference with the wireless signal

Weak signal strength from the wireless access point

Retracted Wi-Fi antenna on the iPad

A

Interference with the wireless signal

Weak signal strength from the wireless access point

There are a number of reasons intermittent wireless connections can occur, but the two most common are lack of a good signal and interference. Increasing the number of repeaters, or being closer to them, can address the lack of a good signal. Interference can be addressed by reducing the number of devices competing for the same channel or by moving away from walls or obstacles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network user with an Android tablet wants to back up and synchronize her data with her phone. Which service should she use to perform these tasks?

Google Sync

Google Cloud

Android Sync

A

Google Sync

Because problems tend to happen no matter how careful you may be, it is important to back up devices and be able to restore from those backups after an incident. Google Sync is available for backups and synchronization of data between Android-based devices and PCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician is troubleshooting a Windows 10 computer that is acting strangely, and she suspects that it’s infected with a virus. She has followed the best practices for malware removal and remediated the computer. What should she do next?

Schedule scans and run updates.

Educate the end user.

Enable system restore and create a restore point.

A

Schedule scans and run updates.

The best practices for malware removal is a seven-step process. Identify malware symptoms, quarantine the infected system, disable system restore (in Windows), remediate infected systems (including update anti-malware software and scan and remove the malware), schedule scans and run updates, enable system restore and create a restore point (in Windows), and educate the end user

17
Q

You are training technicians on the shutdown methods of an iPhone. What are two key differences between a soft reset and a hard reset? (Choose two.)

A hard reset will delete all data on the phone, and a soft reset will not.

A hard reset will work if the touch screen is unresponsive, and a soft reset will not.

A soft reset will keep the data of running applications, and a hard reset will not.

A soft reset will not reset the password, and a hard reset will.

A

A hard reset will work if the touch screen is unresponsive, and a soft reset will not.

A soft reset will keep the data of running applications, and a hard reset will not.

Neither a soft reset nor a hard reset will delete all data on the phone or reset the password. A hard reset will work if the touch screen is unresponsive, and a soft reset will keep the data of running applications. Hard resets should be performed only if the system is locked up or unresponsive

18
Q

A Windows 8 workstation will not load properly. During the Windows 8 boot process, the MBR is responsible for loading which key Windows file?

NTLDR

WINRESUME

WINLOAD

A

WINLOAD

During the Windows 10/8/7 boot process, the master boot record (MBR) determines the file system and loads winload.exe, which starts the official Windows boot process. In Windows 108/7, winload.exe replaces NTLDR from the Windows XP days

19
Q

You are training a class on the installation and repair of Windows 10. What is the purpose of the Windows PE? (Choose two.)

Runs as an operating system on thin clients

Collects information during a Windows 10 install

Launches the Windows RE for troubleshooting

Repairs system files if any become corrupted

A

Collects information during a Windows 10 install

Launches the Windows RE for troubleshooting

The Windows Preinstallation Environment (PE) is a minimal operating system, designed to prepare a computer for installation or to boot into for launching troubleshooting tools such as the Windows Recovery Environment (RE). It is not intended to be an operating system on a computer but rather a stepping-stone to get an OS installed or repaired

20
Q

A technician is working on a Windows 10 workstation. Which command should she use to scan and fix corrupted system files?

SFC /OFFBOOTDIR

SFC /VERIFYFILE

SFC /SCANNOW

A

SFC /SCANNOW

The SFC /SCANNOW command checks all system files and repairs any problems found. SFC /OFFBOOTDIR allows you to set the location of an offline boot directory that can then be used for offline repair. SFC /VERIFYFILE specifies a file to be scanned but not repaired if errors are found. SFC /SCANFIX is not a valid option

21
Q

You believe that someone has been trying to hack into a Windows 7 workstation by guessing passwords. Another administrator suggests you check the log files to be sure. Which utility can you use to see log files?

Event Viewer

Recovery Console

System Monitor

A

Event Viewer

Log files are created to record significant events. Those events can range from security incidents to system problems to just normal user activity. Windows includes Event Viewer for the purpose of looking at log files and identifying problems

22
Q

You power on your Windows 8.1 client computer, and Windows will not load. When you investigate, you notice that the BOOTMGR file has been renamed DASBOOTMGR. You were the last one to use this workstation. What is the most likely cause?

Rogue antivirus

Malware infection

Quarantined boot files

A

Malware infection

Creators of malware have a number of methods by which they can wreak havoc on a system. One of the simplest ways is to delete or rename key system files. Then, the operating system will not work. Just as harmful as deleting or renaming a file is to change the permissions associated with it so that the user can no longer access it or perform those operations