Software Troubleshooting (5) Flashcards
You are educating network users about software security challenges. A user asks what the best way to avoid spam is. What should you recommend to the group?
Install anti-malware on your computer.
Only visit websites that have a secure site (that start with HTTPS://).
Don’t give your email address to websites.
Don’t give your email address to websites
While spam is not truly a virus or a hoax, it is one of the most annoying things with which an administrator must contend. Spam is defined as any unwanted, unsolicited email, and not only can the sheer volume of it be irritating, it can often open the door to larger problems. Administrators can help stop spam with spam filters on email servers. In addition, users can help themselves by not giving out their email addresses to websites that ask for them. Some companies will sell their lists of email addresses to other firms for “marketing” purposes, and then you start to get piles of spam
Mobile device users on your network report that the network has very slow data speeds. Which of the following are likely contributors to this problem? (Choose two.)
Low battery life
Signal interference
Unintended Wi-Fi connections
Weak signal
Signal interference
Weak signal
Slow data speeds can be caused by too much interference or by a weak signal. If there is too much interference, try changing the channel on Wi-Fi routers to less-used channels; performance should increase. Solve weak signals by installing more access points or by moving closer to an existing access point
A client has a Windows 8 computer with a virus on it. She has quarantined the system from the rest of her network. To follow malware removal best practices, what is the next step she should take?
Identify malware symptoms.
Disable system restore.
Enable system restore.
Disable system restore.
The best practice for malware removal is a seven-step process. Identify malware symptoms, quarantine the infected system, disable system restore (in Windows), remediate infected systems (including update anti-malware software and scan and remove the malware), schedule scans and run updates, enable system restore and create a restore point (in Windows), and educate the end user
The GUI fails to load on a Windows 8.1 workstation. The Windows logo appears during boot and then disappears, and the workstation appears to hang. What should you do to resolve the issue?
Boot to the installation DVD, open System Recovery Options, and choose Startup Repair.
Boot to Safe Mode, open System Recovery Options, and choose Startup Repair.
Boot to the installation DVD, open a command prompt, and type Startup Repair.
Boot to the installation DVD, open System Recovery Options, and choose Startup Repair.
Fixing this issue is just like fixing a missing operating system or missing system files. Using the installation DVD (you may have to set the BIOS to use the DVD drive as your primary boot device) or the Windows Repair CD, go to System Recovery Options and choose Startup Repair
An iPad user reports that when he eats lunch in the garden next to the office building, he has intermittent wireless connectivity. What is the most likely cause of this?
Weak signal
Retracted antenna
Low battery
Weak signal
There are a number of reasons intermittent wireless connections can occur, but the two most common are lack of a good signal and interference. Increasing the number of repeaters, or being closer to them, can address the lack of a good signal
On your network, you are concerned about mobile users accidentally granting unauthorized account access or root access. What step should you take to help prevent these security problems?
Apply patches and upgrades as soon as they are available.
Monitor resource utilization and remediate high usage.
Install mobile firewalls on all devices.
Apply patches and upgrades as soon as they are available.
Security holes in mobile device operating systems can leave back doors into which users can get unauthorized account or root access. The majority of these holes are closed by patches and upgrades as soon as they are discovered, so be sure to keep operating systems current
A user with a new iPhone wants to know how she can change her wallpaper, notifications, and battery configurations. Where should she do this?
Using the Configuration app on the iPhone
Using the Desktop, Messages, and Power apps on the iPhone
Using the Settings app on the iPhone
Using the Settings app on the iPhone
Configurations and settings need to be personalized to the user using the device. Except for apps, choosing Settings on the device usually does this, followed by finding the areas that you want to modify and then making the desired changes and saving them
Client computers on your network connect to the Internet through a proxy server. Recently, a Windows 8.1 client was infected with adware and a browser redirector. You have removed the malware, and now the computer will not connect to the Internet. What should you do to resolve the problem?
Disable the network card. Reboot and enable the network card.
Check the IP configuration to ensure it’s pointing to the correct proxy server address.
Disable the proxy server configuration to connect directly to the Internet.
Check the IP configuration to ensure it’s pointing to the correct proxy server address.
Malware can change more settings than you might be aware of on a computer. For example, adware might be obvious because of the pop-ups and browser redirects, but it can also change the client-side IP settings that point to a DNS or proxy server. Check the IP configuration on the client and be sure it’s set properly
You use an iPad and an iPhone at work. Which of the following represents the greatest threats to leaking personal files or data? (Choose two.)
Unauthorized root access
Unintended Wi-Fi connections
Unauthorized location tracking
High resource utilization
Unauthorized root access
Unintended Wi-Fi connections
When authorized users access devices through unintended connections or unauthorized users access absconded devices (such as with root access), they can access the data on the device. Every firm should have a policy for protecting data (encryption) and dealing with leaks when they occur
You receive a notice from your wireless provider that you are about to exceed your data transmission limit for the month. What type of risk does this present?
Your account may be deactivated.
You may incur a security breach.
You may have to pay high fees.
You may have to pay high fees.
Going over the limit on your phone’s data plan is generally not a major risk, other than to your finances. Data overage charges can be high, depending on your provider and service plan
Your favorite restaurant locator app on your iPhone won’t load. You closed it and tried to reopen it a few times and it still doesn’t work. What should you try next?
Remove and reinstall the app.
Perform a force stop.
Reboot the phone and try the app again.
Reboot the phone and try the app again.
If an app does not load, try rebooting (forcing the device to restart, if necessary). If that does not work, attempt to remove and reload the app. Be sure to check the vendor’s site for any similar problems (and solutions) encountered by others
A Windows 7 user’s antivirus software has crashed. He reboots the computer and tries to open it again, and it crashes again. What should he do to solve the problem? (Choose two.)
Look for a patch or update on the manufacturer’s website.
Delete the antivirus software.
Delete and reinstall Windows.
Repair the antivirus installation through Programs in Control Panel.
Look for a patch or update on the manufacturer’s website.
Repair the antivirus installation through Programs in Control Panel.
When an application crashes, you want to isolate the cause of the crash—it could be a compatibility issue, hardware, or a host of other problems—and solve it. One step to take early on is to look for updates/patches/fixes to the application released by the vendor. You can also try to repair the installation through Control Panel. If needed, you can remove and reinstall the software
You have a Windows 8 workstation that is spontaneously shutting down and restarting. What should you do to troubleshoot and resolve the issue?
Check the system BIOS to ensure that the boot order is set properly.
Boot to the Windows installation CD and start the Recovery Console.
Boot to Safe Mode and see whether the problem persists.
Boot to Safe Mode and see whether the problem persists.
Occasionally, a rogue system will begin automatically shutting down and/or restarting while in use. While it could be indicative of a hardware problem (malfunctioning motherboard, for example), it can also indicate a setting misconfiguration or driver problem. The most likely setting problem is with sleep settings, such as hibernation mode. If that’s not it, then it could be a driver. To begin ruling out possibilities, boot the system into Safe Mode and see whether the problem continues. If the problem does not occur while in Safe Mode, then boot normally and begin testing what occurs as you eliminate drivers/devices one by one (sound, video, and so forth) until you find the culprit
An iPhone user reports that her device no longer makes sound, even when she is playing videos or receives a phone call. What is the first thing you should check?
If too many applications are running
If the phone has been put into silent mode
If the connection to the speakers is still operational
If the phone has been put into silent mode
Occasionally, a device can be unknowingly put into silent mode, and this will keep sound from coming to the speakers, headphones, or other connected devices. When troubleshooting, always check to see that silent mode is not enabled (or the volume has been turned completely down) and restart the device if necessary
You want to register some DLL files as command components in the Windows 8.1 Registry. Which command should you use?
REGSVR32
REGEDIT
MSCONFIG
REGSVR32
REGSVR32.EXE, known as the REGSVR32 tool, allows you to register and unregister modules and controls for troubleshooting purposes. It is often associated with Internet Explorer, but it can be used with any control or module. The command-line syntax is REGSVR32 DLLNAME