Software Troubleshooting Flashcards

1
Q

If there is no sound coming from your device, what is a quick way to test for an issue with your speakers?

A

Plug in some headphones.

Explanation:
If you are getting audio through your headphones, but the device does not otherwise produce sound, then you probably have a problem with your speakers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can a user prevent someone from tracking his or her location when using a mobile device?

A

Disable location service on the mobile device.

Explanation:
Cellphones track everywhere you go, storing this for later use. Users should consider disabling location service in the settings of their devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What tool is available to mobile device users to ensure that applications used are secure?

A

an app scanner

Explanation:
App scanners allow users to see if applications have been successfully used by others and they come from legitimate vendors. Apple iPhone apps, purchased through the Apple store, have been approved by Apple and users can be relatively certain the application is legitimate. However, Android users can purchase apps from third-party vendors, since they are considered open sources. These apps are more likely to be insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can be done to recover a cell phone that appears to be completely locked up?

A

Perform a hard reset of the device.

Explanation:
A hard reset on a cell phone is similar to rebooting a PC.

On an iPhone, hold down the Power and Home buttons for 10 seconds.
On a newer version iPhone without a homescreen button, press volume up, press volume down, and press and hold side button for 10 seconds.
On an Android device, there are numerous ways to perform a hard reset, depending on the model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a quick way to check your signal strength and see how fast your Internet connectivity is?

A

Run a speed test.

Explanation:
A speed test is a quick way to see how strong your connection is and to check the bandwidth of that connection. It will show you the exact speeds you are getting for download and upload at that moment in time. It also typically shows ping response times as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user purchased a new cell phone and wants to sell his old, used iPhone on the Internet. What precautions should he take before selling his used phone?

A

Perform a factory reset.

Explanation:
Factory reset removes all personal information from the device. Prior to a factory reset, the user should sync the device to either his PC or iCloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The touch screen on your cell phone is unresponsive. What can you do to resolve this issue?

A

Complete a restart of the device.

Explanation:
Just like a PC, a cell phone needs sufficient system resources to function properly. If there are too many applications launched, they would use up system resources, which could cause the problem. You can resolve this by holding down the power button to restart your device or, depending on the device model, remove the battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is the name for an unsolicited e-mail you receive, typically trying to sell a service or product.

A

spam

Explanation:
Consider adding a spam filter to your system to prevent spam e-mail messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The first step in the best practice procedure for malware removal is to ____.

A

identify malware symptoms

Explanation:
Be able to identify the various symptoms relating to malware. Also be sure to review the seven-step process outlined by CompTIA®.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What device provides a data path to USB attached peripherals?

A

USB controller

Explanation:
When a peripheral is attached via USB, the USB controller controls the power supply and the data path to the peripheral. The 2.0 ports can accommodate five concurrent 100 mA loads, while 3.0 can run six 150 mA loads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Windows command will scan all protected system files and replace any corrupted file?

A

System File Check (SFC)

Explanation:
To run SFC, you will need to be at an elevated command prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is it called when the RTC on a motherboard begins to shift?

A

time drift

Explanation:
The real-time clock (RTC) is on the motherboard. When the RTC begins to shift or lose time, it is referred to as time drift.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Windows tool provides a comprehensive view of all the different events occurring in the operating system?

A

Event Viewer

Explanation:
Not only does Windows Event Viewer display operating system events, but it also contains logs of various system events for troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the procedure for entering Safe Mode in Windows 10?

A

Press F8 during system boot.

Explanation:
Safe Mode will boot the system into basic functions and is used for troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name of the attack in which malware disguises itself as an antivirus program?

A

Rogue antivirus

Explanation:
Rogue antivirus is an attack in which a piece of malware is disguised as a legitimate antivirus program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tool is needed to view logs on an iOS device?

A

Xcode

Explanation:
Xcode is a program that is required in order to view logs on an iOS device. Logcat is the equivalent program for Android devices.

17
Q

When an application freezes and will not close, what is one solution that fixes this problem?

A

Kill the task within Task Manager.

Explanation:
If an application freezes or will not close, killing the task from Task Manager is often a quick way to resolve these issues. In order to kill a task, bring up Task Manager and locate the application in question. Once the application is located, click “End Task”.

18
Q

The seventh and final step in the malware removal process is to ____.

A

educate the user

Explanation:
Users are the last line of defense when it comes to computer security. This is because there is no antivirus or spam filter program that is 100% accurate. Even with these items in place, the user should be educated on proper email and Internet usage to avoid getting a malware infection on his or her device. This is the last step of the malware removal process.

19
Q

If a user begins receiving numerous responses from other users regarding emails he doesn’t recall sending, what could this be a sign of?

A

a hijacked email account

Explanation:
If a user is receiving numerous responses from other users regarding email he supposedly sent, but doesn’t recognize, this is a sign that the account has been hijacked. The hijacker will probably have deleted anything from the Sent folder as well to cover their tracks.

20
Q

When evaluating a functionality issue on a computer or mobile device, what is one of the first things you should do when troubleshooting?

A

Reboot the device.

Explanation:
As simple as it sounds, simply turning the device off and rebooting will fix many common functionality issues on both desktop computers and mobile devices.