Software Troubleshooting (3) Flashcards
A user on your network is concerned about spyware. What should be installed to help stop this threat?
Antivirus software
Anti-malware software
Firewall
Anti-malware software
There are many other forms of malware in addition to viruses. While a true antivirus program will scan for viruses, anti-malware programs are a superset of virus scanners and will look for more than just traditional viruses. They can scan for spyware, ransomware, adware, and other malicious programs as well
A user with a Linux workstation reported that she received an error that says “kernel panic.” What should she do to resolve the issue?
Close the program that caused the error and continue working.
Reboot the workstation and see whether the issue persists.
Reboot into Safe Mode and run Linux Diagnostics to determine the cause of the problem.
Reboot the workstation and see whether the issue persists.
In the Unix/Linux world, a kernel panic is when the OS crashes, much like a blue screen of death in Windows. This occurs when the operating system detects an error from which it cannot safely recover—rather than one app crashing, the whole system does. First, reboot. If it comes back, solutions usually include updating hardware, firmware, software, and the OS itself. You can also check drives and RAM for errors that might be causing the crash and correct any problems that you uncover
Your Windows 10 workstation started running very slowly. Which of the following could cause that to happen?
Rogue antivirus
Malware
Hijacked email
Malware
A computer slowdown could happen because of many things, such as hardware failure, an excessively full hard drive, not enough virtual memory, or malware. Rogue antivirus, hijacked email, and invalid certificates will cause problems but not computer slowdowns
You want to broadcast the contents of your iPhone screen to a computer monitor. What are two ways you can accomplish this? (Choose two.)
Use Apple TV.
Enable iBroadcast on the iPhone.
Download an app that lets you broadcast wirelessly.
Plug the computer monitor in to the iPhone’s video port.
Use Apple TV.
Download an app that lets you broadcast wirelessly.
iPads and iPhones are not large enough to have external DVI or other video ports. If you want to project to an external monitor, you need an adapter, Apple TV, or an app that will allow you to broadcast to the monitor over Wi-Fi or Bluetooth
You install an updated video card driver, and your Windows 10 workstation crashes with a blue screen of death. What are the quickest two options for getting your system running again? (Choose two.)
Reinstall Windows.
Boot to the Windows installation CD and start the Recovery Console.
Boot to Safe Mode and uninstall the video card driver.
Boot to the Last Known Good configuration.
Boot to Safe Mode and uninstall the video card driver.
Boot to the Last Known Good configuration.
It’s most likely the driver that’s causing the problem. One of the quickest (and best) ways to proceed is to boot to Safe Mode, which loads a standard VGA driver. Then you can uninstall the new video card driver. The other way is to boot to the Last Known Good configuration. Last Known Good will roll back the system to the state it was in when the last person logged in. So, if that was before the faulty driver was installed, it might solve the problem
Your Windows 7 workstation is having problems at startup. Too many applications are loading, and it is slowing the system down considerably. Which tool should you use to disable programs from loading automatically at startup?
REGEDIT
REGSVR32
MSCONFIG
MSCONFIG
The MSCONFIG utility helps troubleshoot startup problems by allowing you to selectively disable individual items that are normally executed at startup. There is no menu command for this utility; you must run it with the Run command (on the Start menu). Choose Start ➣ Run, and type MSCONFIG. It works in most versions of Windows, although the interface window is slightly different among versions
A user just tried to boot his Windows 7 workstation, and Windows will not load. When you investigate, you notice that several key boot files for Windows have been deleted. What is this a sign of?
Virus infection
Ransomware infection
Rogue antivirus
Virus infection
Creators of malware have a number of methods by which they can wreak havoc on a system. One of the simplest ways is to delete key system files. Then, the operating system will not work
You have one Linux workstation on your network. Another administrator gives you advice on how to enable an antivirus program, and she tells you that you need to type in the commands. What is the name of the interface where you do this?
Shell
Bash
Terminal
Terminal
The Linux terminal is where commands are typed into. (It’s the equivalent of a Windows command prompt.) Then, the commands are processed by the shell. The most common shell in Linux systems is bash, which stands for Bourne Again Shell
You arrive at work in the morning to see that your inbox is full of automated replies and out-of-office messages. The subject line is for something you did not send. What is this a sign of?
Ransomware
Hijacked email
Rogue email server
Hijacked email
Hijacked email is when an attacker sends out an email from your address to your contacts or as spam to others. One of the easiest ways to spread malware is to capture the email contacts of a user and send it as an attachment to all of those in their circle. The recipient is more likely to open the attachment because it seemingly comes from a trusted source
You are troubleshooting a Windows 8.1 workstation that has contracted a virus. According to the best practices for malware removal, which two steps are part of remediating the infected system? (Choose two.)
Disable system restore.
Schedule scans and run updates.
Scan for and remove the virus.
Update antivirus software.
Scan for and remove the virus.
Update antivirus software.
The best practice for malware removal is a seven-step process. Identify malware symptoms, quarantine the infected system, disable system restore (in Windows), remediate infected systems (including update anti-malware software and scan and remove the malware), schedule scans and run updates, enable system restore and create a restore point (in Windows), and educate the end user
You have a Windows 8 workstation that is not booting properly. You need to boot to the installation DVD to repair the installation. Where do you make the change to the boot settings?
Recovery console
Automated system recovery
BIOS/UEFI
BIOS/UEFI
The BIOS or UEFI will contain the boot order, which is what you need to change. You can set the system to boot to a hard drive, optical drive, network card, or other options
You are visiting a website using Internet Explorer, and without you clicking anything, a new Internet Explorer window opens in front of it with an advertisement. Which of the following is the most likely explanation?
Your computer has been infected with spyware.
Your computer has been infected with a virus.
The website is programmed to show a pop-up advertisement.
The website is programmed to show a pop-up advertisement.
Pop-ups are annoying but not necessarily an indication that your computer is infected with anything. Adware pop-ups usually spam your desktop with multiple (if not dozens of) windows at the same time. Spyware generally doesn’t announce its presence, and viruses generally do more damage than a simple pop-up ad does
In the afternoon, you start receiving email responses from co-workers and friends. They want to know why you are trying to directly sell them electronics through a suspicious-sounding website. What is most likely the cause of this?
Hijacked email
Poisoned email server
Rogue antivirus
Hijacked email
Hijacked email is when an attacker sends out an email from your address to your contacts or as spam to others. One of the easiest ways to spread malware is to capture the email contacts of a user and send it as an attachment to all of those in their circle. The recipient is more likely to open the attachment because it seemingly comes from a trusted source
A technician is describing a situation he had yesterday where the workstation gave him a kernel panic error and locked up. What operating system was the technician most likely dealing with?
MacOS
Windows 10
Linux
Linux
In the Unix/Linux world, a kernel panic is when the OS crashes, much like a blue screen of death in Windows. This occurs when the operating system detects an error from which it cannot safely recover—rather than one app crashing, the whole system does. The first step in troubleshooting a kernel panic is to reboot and see whether the error persists
When booting a Windows 8.1 workstation, a user receives an error message about a missing DLL file. However, Windows still loads. Which utility should you use to attempt to fix the issue?
SFC
Recovery Console
REGSVR32
SFC
Numerous dynamic link library (DLL) files are required to boot, but usually the lack of corruption of one of them produces a noncritical error. Within the Windows toolkit, the best utility to use to tackle this problem is the System File Checker (SFC)