Software Troubleshooting Flashcards
A user is experiencing multiple pop-ups when he opens his computer web browser. What type of malicious software could account for this?
adware
Any software program in which advertising banners are displayed while the program is running is referred to as adware.
What are all the steps to removing malware?
Identify and research malware symptoms.
Quarantine infected system.
Disable system restore.
Remediate infected systems.
Schedule scans and run updates.
Enable system restore.
Educate the end-user.
A user has successfully set up dual monitors on his system, but the mouse does not track correctly from one screen to the next. Explain the procedure to remedy this issue.
The monitors must be realigned in Display Settings.
The monitors must be realigned. Right-click on desktop and select Display Settings, drag the screens to properly orient them so the mouse will track from screen to screen in normal order.
A user complains that his disk drive appears to be running very slowly and it is beginning to affect the system speed. He checked and the hard drive is less than half full. What suggestions can you make to help speed up his hard drive?
Defragment the hard drive.
There is a good chance that the files on his drive have become fragmented. The user should defragment the drive, unless he is using a solid-state drive (SSD), which should never be defragmented.
A client calls and wants to be able to view, search, or even edit the system registry file. What would you suggest?
Regedit allows users to view, search, and edit the system registry file. Be certain to explain to the client the issues with editing the registry.
You have just completely removed viruses from a system. According to CompTIA A+ specifications, the 7th, and final, step in the “Best Practice for removing malware” is ____.
Educate the end user.
A user calls the hotline wanting to know where he can view error logs on his Linux system. Where is the most common location for these files on a Linux system?
/var/log
Most releases of Linux store error files in the /var/log directory.
How can you view logs in Windows systems?
The Event Viewer.
The Event Viewer not only displays the events running but also errors, log files, and system warnings, which are all very useful in troubleshooting.
A client calls stating that he is constantly receiving e-mail responses to e-mail messages he never sent. What has happened to his system?
Malware has hijacked his e-mail account and is now sending e-mail through his account. These messages could also be a result of spoofing or phishing, but those are not answer choices.
After connecting to a new wireless network, a user receives a message that states “Limited Connectivity”. What is a possible cause of this issue?
The computer did not receive an IP address from the DHCP server after connecting to the network.
Limited connectivity is a type of network issue that occurs when the computer can see the network, but there is an issue with the connection. One common cause of this issue is when the computer isn’t getting an IP address from a DHCP server.
A technician would like to restart a service to see if it will fix an issue with an application. Where can the technician restart services?
To restart a service, open Services.msc. In the services menu, search for the service in question. In the left panel there should be an option to restart the service.
A user’s computer is taking an extremely long time to start up. What could be done to potentially solve this issue?
Disable unnecessary programs from startup.
Having too many programs run upon startup can cause a computer to start up much slower than is desirable. One solution is to navigate to the Task Manager and disable any startup programs that are not needed.
A user opened up a web browser and noticed that the page looked very different from her normal home page. She also noticed that her default search engine had changed to a third-party one she had never heard of before. What type of attack is this user likely experiencing?
browser redirection
If you find your browser has been changed, or that the results of a search come from a third-party site, it is likely that your browser has been redirected by malware.
rogue antivirus
If a user believes that they are downloading a legitimate antivirus, but the antivirus program actually turns out to be malware
A user is having an issue pairing Bluetooth headphones with his mobile device. What should the user try first?
The first step to troubleshooting Bluetooth connectivity issues is very basic; you should confirm that you have Bluetooth turned “on” on the device in question. If it is on, then sometimes toggling it off and back on can help. Steps like rebooting should come a little later in the troubleshooting process.
XCode applications allow you to
view logs on an iOS device.
Logcat allows you to -
view logs on an Android device.
To view logs on an Android device, you could use the application Logcat.
What does it mean when users report their computer is “running slow”?
Unfortunately, this can mean different things for each user. When users tell you that their computer is running slower than normal, it’s important that you ask for specifics.
While slow system performance could be the cause of faulty hardware or an operating system problem, it could also be caused by a security issue. If a system is infected with malware, system performance may be slowed considerably.
What does “limited connectivity” mean?
Limited connectivity is a type of network issue. Essentially, the computer is able to see the network, and even partially connect to it, but there is an issue with that connection. For example, if a computer connects to a network but doesn’t receive IP address information from a DHCP server, it will show the limited connectivity message.
What does a “failure to boot” mean?
occurs when the computer is unable to load the operating system. One type of failure to boot is “No OS found.”
What does “no OS found” mean?
No OS found is a specific type of failure to boot. No OS found occurs when the computer is unable to locate OS files. This can be either because the storage devices do not contain any OS files, or the boot configuration loader is pointing to the wrong partition.