Software Troubleshooting (3) Flashcards

1
Q

A user on your network is concerned about spyware. What should be installed to help stop this threat?

Antivirus software

Anti-malware software

Firewall

A

Anti-malware software

There are many other forms of malware in addition to viruses. While a true antivirus program will scan for viruses, anti-malware programs are a superset of virus scanners and will look for more than just traditional viruses. They can scan for spyware, ransomware, adware, and other malicious programs as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user with a Linux workstation reported that she received an error that says “kernel panic.” What should she do to resolve the issue?

Close the program that caused the error and continue working.

Reboot the workstation and see whether the issue persists.

Reboot into Safe Mode and run Linux Diagnostics to determine the cause of the problem.

A

Reboot the workstation and see whether the issue persists.

In the Unix/Linux world, a kernel panic is when the OS crashes, much like a blue screen of death in Windows. This occurs when the operating system detects an error from which it cannot safely recover—rather than one app crashing, the whole system does. First, reboot. If it comes back, solutions usually include updating hardware, firmware, software, and the OS itself. You can also check drives and RAM for errors that might be causing the crash and correct any problems that you uncover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your Windows 10 workstation started running very slowly. Which of the following could cause that to happen?

Rogue antivirus

Malware

Hijacked email

A

Malware

A computer slowdown could happen because of many things, such as hardware failure, an excessively full hard drive, not enough virtual memory, or malware. Rogue antivirus, hijacked email, and invalid certificates will cause problems but not computer slowdowns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You want to broadcast the contents of your iPhone screen to a computer monitor. What are two ways you can accomplish this? (Choose two.)

Use Apple TV.

Enable iBroadcast on the iPhone.

Download an app that lets you broadcast wirelessly.

Plug the computer monitor in to the iPhone’s video port.

A

Use Apple TV.

Download an app that lets you broadcast wirelessly.

iPads and iPhones are not large enough to have external DVI or other video ports. If you want to project to an external monitor, you need an adapter, Apple TV, or an app that will allow you to broadcast to the monitor over Wi-Fi or Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You install an updated video card driver, and your Windows 10 workstation crashes with a blue screen of death. What are the quickest two options for getting your system running again? (Choose two.)

Reinstall Windows.

Boot to the Windows installation CD and start the Recovery Console.

Boot to Safe Mode and uninstall the video card driver.

Boot to the Last Known Good configuration.

A

Boot to Safe Mode and uninstall the video card driver.

Boot to the Last Known Good configuration.

It’s most likely the driver that’s causing the problem. One of the quickest (and best) ways to proceed is to boot to Safe Mode, which loads a standard VGA driver. Then you can uninstall the new video card driver. The other way is to boot to the Last Known Good configuration. Last Known Good will roll back the system to the state it was in when the last person logged in. So, if that was before the faulty driver was installed, it might solve the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your Windows 7 workstation is having problems at startup. Too many applications are loading, and it is slowing the system down considerably. Which tool should you use to disable programs from loading automatically at startup?

REGEDIT

REGSVR32

MSCONFIG

A

MSCONFIG

The MSCONFIG utility helps troubleshoot startup problems by allowing you to selectively disable individual items that are normally executed at startup. There is no menu command for this utility; you must run it with the Run command (on the Start menu). Choose Start ➣ Run, and type MSCONFIG. It works in most versions of Windows, although the interface window is slightly different among versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user just tried to boot his Windows 7 workstation, and Windows will not load. When you investigate, you notice that several key boot files for Windows have been deleted. What is this a sign of?

Virus infection

Ransomware infection

Rogue antivirus

A

Virus infection

Creators of malware have a number of methods by which they can wreak havoc on a system. One of the simplest ways is to delete key system files. Then, the operating system will not work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have one Linux workstation on your network. Another administrator gives you advice on how to enable an antivirus program, and she tells you that you need to type in the commands. What is the name of the interface where you do this?

Shell

Bash

Terminal

A

Terminal

The Linux terminal is where commands are typed into. (It’s the equivalent of a Windows command prompt.) Then, the commands are processed by the shell. The most common shell in Linux systems is bash, which stands for Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You arrive at work in the morning to see that your inbox is full of automated replies and out-of-office messages. The subject line is for something you did not send. What is this a sign of?

Ransomware

Hijacked email

Rogue email server

A

Hijacked email

Hijacked email is when an attacker sends out an email from your address to your contacts or as spam to others. One of the easiest ways to spread malware is to capture the email contacts of a user and send it as an attachment to all of those in their circle. The recipient is more likely to open the attachment because it seemingly comes from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are troubleshooting a Windows 8.1 workstation that has contracted a virus. According to the best practices for malware removal, which two steps are part of remediating the infected system? (Choose two.)

Disable system restore.

Schedule scans and run updates.

Scan for and remove the virus.

Update antivirus software.

A

Scan for and remove the virus.

Update antivirus software.

The best practice for malware removal is a seven-step process. Identify malware symptoms, quarantine the infected system, disable system restore (in Windows), remediate infected systems (including update anti-malware software and scan and remove the malware), schedule scans and run updates, enable system restore and create a restore point (in Windows), and educate the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have a Windows 8 workstation that is not booting properly. You need to boot to the installation DVD to repair the installation. Where do you make the change to the boot settings?

Recovery console

Automated system recovery

BIOS/UEFI

A

BIOS/UEFI

The BIOS or UEFI will contain the boot order, which is what you need to change. You can set the system to boot to a hard drive, optical drive, network card, or other options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are visiting a website using Internet Explorer, and without you clicking anything, a new Internet Explorer window opens in front of it with an advertisement. Which of the following is the most likely explanation?

Your computer has been infected with spyware.

Your computer has been infected with a virus.

The website is programmed to show a pop-up advertisement.

A

The website is programmed to show a pop-up advertisement.

Pop-ups are annoying but not necessarily an indication that your computer is infected with anything. Adware pop-ups usually spam your desktop with multiple (if not dozens of) windows at the same time. Spyware generally doesn’t announce its presence, and viruses generally do more damage than a simple pop-up ad does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the afternoon, you start receiving email responses from co-workers and friends. They want to know why you are trying to directly sell them electronics through a suspicious-sounding website. What is most likely the cause of this?

Hijacked email

Poisoned email server

Rogue antivirus

A

Hijacked email

Hijacked email is when an attacker sends out an email from your address to your contacts or as spam to others. One of the easiest ways to spread malware is to capture the email contacts of a user and send it as an attachment to all of those in their circle. The recipient is more likely to open the attachment because it seemingly comes from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician is describing a situation he had yesterday where the workstation gave him a kernel panic error and locked up. What operating system was the technician most likely dealing with?

MacOS

Windows 10

Linux

A

Linux

In the Unix/Linux world, a kernel panic is when the OS crashes, much like a blue screen of death in Windows. This occurs when the operating system detects an error from which it cannot safely recover—rather than one app crashing, the whole system does. The first step in troubleshooting a kernel panic is to reboot and see whether the error persists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When booting a Windows 8.1 workstation, a user receives an error message about a missing DLL file. However, Windows still loads. Which utility should you use to attempt to fix the issue?

SFC

Recovery Console

REGSVR32

A

SFC

Numerous dynamic link library (DLL) files are required to boot, but usually the lack of corruption of one of them produces a noncritical error. Within the Windows toolkit, the best utility to use to tackle this problem is the System File Checker (SFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The touch screen on a user’s iPhone is not responding, and the phone is powered on. What should you recommend she do as a next step to get the phone working again?

Perform a hard reset.

Perform a soft reset.

Perform a force stop.

A

Perform a hard reset.

If a touch screen device is not responsive, the first step is to reboot the device. In the case of an iPhone, a soft reset won’t likely work (because the touch screen is not responsive), so try a hard reset. Press and hold down the Home and Sleep/Wake buttons for about 10 seconds, and then the Apple logo will appear. The phone will shut off. Then use the Sleep/Wake button to power it back on

17
Q

On a Windows 7 workstation, you receive an error message that says “Security Center service cannot be started,” but Windows still loads. What is the first step you should try in troubleshooting the problem?

Reinstall the service with MSCONFIG.

Check to see whether the service is set to be started automatically in Services.

Check to see whether the service is set to be started automatically using REGEDIT.

A

Check to see whether the service is set to be started automatically in Services.

First, make sure that the service is configured to start properly. You can do this in the Services MMC app. An easy way to open Services is to click Start and type services in the search box. Then find Security Center and see what it’s set to. It should be set to a Startup type of Automatic (Delayed Start)

18
Q

An Android phone user just received a new Bluetooth headset for phone calls. She reports that it does not work with her phone. Both devices are powered on and appear to be operational. What is most likely the problem?

Bluetooth is turned off on the mobile headset.

The devices need to be paired.

Airplane mode is on.

A

The devices need to be paired.

If the Bluetooth devices have not been used together previously, they need to be paired to work. Pairing is usually a simple process where one device locates the other, a PIN is entered for security, and connectivity is tested. Then the two will work together. Otherwise, lack of Bluetooth connectivity is often caused when a device is not turned on and/or has an improper setting for discoverability

19
Q

Your Windows 7 workstation performance has been slowing down, particularly when it comes to disk reads and writes. Which of the following tools is designed to help improve your hard disk performance?

REGEDIT

DEFRAG

REGSVR32

A

DEFRAG

Defragmenting a disk involves analyzing the disk and then consolidating fragmented files and folders so that they occupy a contiguous space, thus increasing performance during file retrieval. In Windows, there are a few different ways that you can get to the Disk Defragmenter, but the command prompt version is DEFRAG. The need for defragmenting the drive is only necessary on a drive with platters (HDDs), not solid-state drives (SSDs)

20
Q

You have a Windows 8.1 workstation that will not boot properly. After the POST, the screen displays a message saying “Operating System Not Found.” What is most likely causing the problem?

BOOTMGR

Boot.ini

BCD

A

BCD

Windows 10/8/7 use Boot Configuration Data (BCD), which holds information about which OSs are installed on the computer. If BCD isn’t able to find the OS bootstrap files (BOOTMGR in this case), then Windows won’t load. BCD, which is edited with BCDEDIT.EXE, replaces the BOOT.INI file, which was used in Windows XP and other older versions of Windows

21
Q

You are troubleshooting a Windows 7 workstation and believe it has malware. To follow the best practices for malware removal, after you identify the malware symptoms, which step should you take?

Update the anti-malware software.

Disable system restore.

Quarantine the infected system.

A

Quarantine the infected system.

The best practice for malware removal is a seven-step process. Identify malware symptoms, quarantine the infected system, disable system restore (in Windows), remediate infected systems (including update anti-malware software and scan and remove the malware), schedule scans and run updates, enable system restore and create a restore point (in Windows), and educate the end user

22
Q

While driving through the remote countryside, you notice that your mobile phone battery has been quickly drained of power. What is the most likely cause of this?

The battery needs to be replaced.

The phone has been searching for a signal.

You need to perform a soft reset.

A

The phone has been searching for a signal.

While apps, usage, and so on can contribute to a power drain, one of the biggest offenders is the search for a cellular signal