Software Troubleshooting Flashcards
Which type of file cannot be copied from another machine if missing or corrupted?
.dll
boot.ini
ntldr
boot.ini
The boot.ini file is specific to the machine. A .dll file is a file type and not a specific file. The ntldr is the file that loads the operating system. Bootmgr is a file in later systems that manages the boot process
Which of the following is not a possible cause of a “no operating system found” message?
Incorrect boot device order in the BIOS
Corrupted or missing boot sector
System disk in the DVD drive
System disk in the DVD drive
If there was a disk with system files in the DVD drive, the system would boot to it. A nonsystem disk, a corrupted or missing boot sector, and an incorrect boot order in the BIOS could all be possible causes
What is external code that changes your Internet Explorer settings?
Man-in-the-middle attack
Browser redirection
SYN flood
Browser redirection
A browser redirection is one of the most serious security problems. Browser hijacking software is external code that changes your Internet Explorer settings. It may include changing your home page or adding or removing items from your favorites. A man-in-the-middle attack is when the malicious individual positions himself between two communicating system, receiving all data. A SYN flood is a form of a DoS attack. Fraggle is an attack using UDP packets
Which of the following is not a symptom of malware?
Increase in performance
Internet connectivity issues
Browser redirection
Increase in performance
Malware decreases performance. It can cause Internet connectivity issues, browser redirection, and pop-ups
Which of the following is the first step in malware removal?
Quarantine the infected systems.
Educate the end user.
Identify and research malware symptoms.
Identify and research malware symptoms.
The steps are as follows:
Identify and research malware symptoms.
Quarantine the infected systems.
Disable System Restore (in Windows).
Remediate the infected systems.
Schedule scans and run updates.
Enable System Restore and create a restore point (in Windows).
Educate the end user.
What Windows service should be disabled before cleaning an infection?
NAT
System Restore
Windows Firewall
System Restore
Although it is recommended that you disable System Restore before cleaning an infection, it is a good idea to create a restore point after an infection is cleaned. This gives you a clean restore point going forward in case the system becomes infected again at some point. Network address translation, the Windows Firewall, and your antivirus should not be disabled
Which of the following does not negatively impact mobile battery life?
Low brightness setting
Location services
Enabled Bluetooth
Low brightness setting
A low brightness setting does not negatively impact battery life. A high setting, however, does. Location services, Bluetooth, and overheating do not negatively affect battery life
Which of the following does not cause overheating of a mobile device?
Excessive gaming
Leaving phone on
Old battery
Leaving phone on
While leaving the phone on will run down the battery, it will not alone cause it to overheat. Excessive gaming, using an old battery, and continuous online browsing will cause overheating
Which of the following is not an indication of a security issue with a mobile device?
Weak signal
Slow speeds
Low resource utilization
Low resource utilization
On the contrary, evidence of malware or other issues is usually accompanied by very high resource utilization. Unusual loss of power, slow speeds, and a weak signal are all signs of security issues
Which of the following is an indication of a security issue with a mobile device?
Low resource utilization
Disabled microphone
Enabled camera
Enabled camera
When cameras have been enabled when they weren’t previously, it is an indication of compromise. Low resource utilization, a disabled microphone, and authorized use of the device are not symptoms of a security issue