Software Troubleshooting Flashcards

1
Q

Which type of file cannot be copied from another machine if missing or corrupted?

.dll

boot.ini

ntldr

A

boot.ini

The boot.ini file is specific to the machine. A .dll file is a file type and not a specific file. The ntldr is the file that loads the operating system. Bootmgr is a file in later systems that manages the boot process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is not a possible cause of a “no operating system found” message?

Incorrect boot device order in the BIOS

Corrupted or missing boot sector

System disk in the DVD drive

A

System disk in the DVD drive

If there was a disk with system files in the DVD drive, the system would boot to it. A nonsystem disk, a corrupted or missing boot sector, and an incorrect boot order in the BIOS could all be possible causes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is external code that changes your Internet Explorer settings?

Man-in-the-middle attack

Browser redirection

SYN flood

A

Browser redirection

A browser redirection is one of the most serious security problems. Browser hijacking software is external code that changes your Internet Explorer settings. It may include changing your home page or adding or removing items from your favorites. A man-in-the-middle attack is when the malicious individual positions himself between two communicating system, receiving all data. A SYN flood is a form of a DoS attack. Fraggle is an attack using UDP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not a symptom of malware?

Increase in performance

Internet connectivity issues

Browser redirection

A

Increase in performance

Malware decreases performance. It can cause Internet connectivity issues, browser redirection, and pop-ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the first step in malware removal?

Quarantine the infected systems.

Educate the end user.

Identify and research malware symptoms.

A

Identify and research malware symptoms.

The steps are as follows:

Identify and research malware symptoms.

Quarantine the infected systems.

Disable System Restore (in Windows).

Remediate the infected systems.

Schedule scans and run updates.

Enable System Restore and create a restore point (in Windows).

Educate the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Windows service should be disabled before cleaning an infection?

NAT

System Restore

Windows Firewall

A

System Restore

Although it is recommended that you disable System Restore before cleaning an infection, it is a good idea to create a restore point after an infection is cleaned. This gives you a clean restore point going forward in case the system becomes infected again at some point. Network address translation, the Windows Firewall, and your antivirus should not be disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following does not negatively impact mobile battery life?

Low brightness setting

Location services

Enabled Bluetooth

A

Low brightness setting

A low brightness setting does not negatively impact battery life. A high setting, however, does. Location services, Bluetooth, and overheating do not negatively affect battery life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following does not cause overheating of a mobile device?

Excessive gaming

Leaving phone on

Old battery

A

Leaving phone on

While leaving the phone on will run down the battery, it will not alone cause it to overheat. Excessive gaming, using an old battery, and continuous online browsing will cause overheating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is not an indication of a security issue with a mobile device?

Weak signal

Slow speeds

Low resource utilization

A

Low resource utilization

On the contrary, evidence of malware or other issues is usually accompanied by very high resource utilization. Unusual loss of power, slow speeds, and a weak signal are all signs of security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an indication of a security issue with a mobile device?

Low resource utilization

Disabled microphone

Enabled camera

A

Enabled camera

When cameras have been enabled when they weren’t previously, it is an indication of compromise. Low resource utilization, a disabled microphone, and authorized use of the device are not symptoms of a security issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly