Software Troubleshooting Flashcards
While troubleshooting a malware infection, you use a USB to boot into a lightweight version of Windows. What environment did you MOST likely boot into?
WinPE
During the Runtime (RT) phase of the boot process, control is transferred to ntoskrnl.exe. What three functions does ntoskrnl.exe perform?
- Configures the OS environment
- Load device drivers
- Start services
What plays a critical role in the boot process, performing essential tasks such loading device drivers, initiating system services, and configuring the OS environment?
ntoskrnl.exe
Once the malware infection has been fully removed, you should re-enable System Restore and perform a full system backup. Where is the BEST location to store this backup?
On an external drive
Your Windows OS has been behaving unusually, and you discover that an automatic update occurred three days ago. What is the best step to take in resolving this issue?
Uninstall the update
What is a feature of a sheep dip computer?
Has port monitors and file monitors
Which two programs run during the startup process to enable user logon?
- Wininit
- Winlogon
After installing a new device, you encounter startup errors. What is the first step you should take to troubleshoot the problem?
Boot in Safe Mode and roll back the driver
System Restore is enabled for all volumes on a Windows system. Recently, a new network driver was installed, but it contained bugs that caused your network board to stop functioning, preventing internet access to download an earlier version of the driver. You need to revert the system to a restore point that was created before the driver installation. On the system Properties window, which option would you select to accomplish this?
System Restore
What must you utilize to boot from a hard drive?
Active partition
Primary partitions are subdivided into logical drives, true or false?
False
You are an IT technician for your company. Veronica, an employee, has reported receiving error messages about corrupt or missing Windows system files. To address this, you ran the Windows System File Checker tool (SFC.exe). After the files were repaired, Veronica contacted you again, indicating that the issue persists. You now suspect that malware may be causing the corruption or renaming of the system files. What is your FIRST step to take to remove any potential malware from the system?
Disconnect the computer from the network
While overseeing disk space for computers on your network, you’re interested in understanding how a new application might affect your available free space. Where can you locate the estimated size of this application?
In the app’s description in the Microsoft Store
What can an overheated hard drive cause?
System instability
After booting your Windows workstation in Safe Mode and enabling boot logging, which log file will contain the boot logging information?
Ntbtlog.txt
You’ve installed a new Ethernet network adapter in your Windows 11 desktop. After installation, the card is detected in Device Manager, but Windows cannot identify it. You download and install a driver you found online, but after rebooting, your system crashes immediately upon logging in. Rebooting again leads to the same outcome. What would be the BEST method to resolve this issue and allow Windows to load correctly?
Boot to Safe Mode and uninstall the network driver
After installing multiple devices to a computer, it fails to boot correctly. What is the BEST initial troubleshooting step to take?
Remove all of the newly added devices and install them one at a time
What keys let you switch between keyboard languages?
Globe key
You plan to upgrade your Windows 10 Professional computer to Windows 11 Professional. Upon checking the hardware, you find it has 2 GB of RAM, a 2.0 GHz dual-core processor, a 256 GB solid state drive, and a video adapter with 128 MB of RAM along with DirectX 12 support. You instend to install the 64-bit version of Windows 11. What steps should you take next?
Add more memory
A user requests assistance with a task that you’re unfamiliar with and that falls outside your job responsibilities. What is the MOST appropriate way to handle this request?
Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.
A technician suspects that an application on a tablet may be secretly accessing the camera without authorization. What is the BEST method to troubleshoot this issue?
Run an anti-malware scan
A security technician is performing a forensic analysis. What actions is MOST likely to compromise or destroy crucial evidence?
Shutting down the system
While working on your Windows 10 laptop during a severe thunderstorm, a lightning strike hits a nearby transformer, causing a power outage in your office. Since your laptop’s battery is dead, the computer shuts down abruptly. After power is restored, you turn your computer back on and see a missing DLL error message. What tool is most likely to resolve this issue?
sfc
The primary modifier key on Apple systems, used like the Ctrl key on a Windows system is?
command