Software Troubleshooting (5) Flashcards

1
Q

You are educating network users about software security challenges. A user asks what the best way to avoid spam is. What should you recommend to the group?

Install anti-malware on your computer.

Only visit websites that have a secure site (that start with HTTPS://).

Don’t give your email address to websites.

A

Don’t give your email address to websites

While spam is not truly a virus or a hoax, it is one of the most annoying things with which an administrator must contend. Spam is defined as any unwanted, unsolicited email, and not only can the sheer volume of it be irritating, it can often open the door to larger problems. Administrators can help stop spam with spam filters on email servers. In addition, users can help themselves by not giving out their email addresses to websites that ask for them. Some companies will sell their lists of email addresses to other firms for “marketing” purposes, and then you start to get piles of spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mobile device users on your network report that the network has very slow data speeds. Which of the following are likely contributors to this problem? (Choose two.)

Low battery life

Signal interference

Unintended Wi-Fi connections

Weak signal

A

Signal interference

Weak signal

Slow data speeds can be caused by too much interference or by a weak signal. If there is too much interference, try changing the channel on Wi-Fi routers to less-used channels; performance should increase. Solve weak signals by installing more access points or by moving closer to an existing access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A client has a Windows 8 computer with a virus on it. She has quarantined the system from the rest of her network. To follow malware removal best practices, what is the next step she should take?

Identify malware symptoms.

Disable system restore.

Enable system restore.

A

Disable system restore.

The best practice for malware removal is a seven-step process. Identify malware symptoms, quarantine the infected system, disable system restore (in Windows), remediate infected systems (including update anti-malware software and scan and remove the malware), schedule scans and run updates, enable system restore and create a restore point (in Windows), and educate the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The GUI fails to load on a Windows 8.1 workstation. The Windows logo appears during boot and then disappears, and the workstation appears to hang. What should you do to resolve the issue?

Boot to the installation DVD, open System Recovery Options, and choose Startup Repair.

Boot to Safe Mode, open System Recovery Options, and choose Startup Repair.

Boot to the installation DVD, open a command prompt, and type Startup Repair.

A

Boot to the installation DVD, open System Recovery Options, and choose Startup Repair.

Fixing this issue is just like fixing a missing operating system or missing system files. Using the installation DVD (you may have to set the BIOS to use the DVD drive as your primary boot device) or the Windows Repair CD, go to System Recovery Options and choose Startup Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An iPad user reports that when he eats lunch in the garden next to the office building, he has intermittent wireless connectivity. What is the most likely cause of this?

Weak signal

Retracted antenna

Low battery

A

Weak signal

There are a number of reasons intermittent wireless connections can occur, but the two most common are lack of a good signal and interference. Increasing the number of repeaters, or being closer to them, can address the lack of a good signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On your network, you are concerned about mobile users accidentally granting unauthorized account access or root access. What step should you take to help prevent these security problems?

Apply patches and upgrades as soon as they are available.

Monitor resource utilization and remediate high usage.

Install mobile firewalls on all devices.

A

Apply patches and upgrades as soon as they are available.

Security holes in mobile device operating systems can leave back doors into which users can get unauthorized account or root access. The majority of these holes are closed by patches and upgrades as soon as they are discovered, so be sure to keep operating systems current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user with a new iPhone wants to know how she can change her wallpaper, notifications, and battery configurations. Where should she do this?

Using the Configuration app on the iPhone

Using the Desktop, Messages, and Power apps on the iPhone

Using the Settings app on the iPhone

A

Using the Settings app on the iPhone

Configurations and settings need to be personalized to the user using the device. Except for apps, choosing Settings on the device usually does this, followed by finding the areas that you want to modify and then making the desired changes and saving them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client computers on your network connect to the Internet through a proxy server. Recently, a Windows 8.1 client was infected with adware and a browser redirector. You have removed the malware, and now the computer will not connect to the Internet. What should you do to resolve the problem?

Disable the network card. Reboot and enable the network card.

Check the IP configuration to ensure it’s pointing to the correct proxy server address.

Disable the proxy server configuration to connect directly to the Internet.

A

Check the IP configuration to ensure it’s pointing to the correct proxy server address.

Malware can change more settings than you might be aware of on a computer. For example, adware might be obvious because of the pop-ups and browser redirects, but it can also change the client-side IP settings that point to a DNS or proxy server. Check the IP configuration on the client and be sure it’s set properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You use an iPad and an iPhone at work. Which of the following represents the greatest threats to leaking personal files or data? (Choose two.)

Unauthorized root access

Unintended Wi-Fi connections

Unauthorized location tracking

High resource utilization

A

Unauthorized root access

Unintended Wi-Fi connections

When authorized users access devices through unintended connections or unauthorized users access absconded devices (such as with root access), they can access the data on the device. Every firm should have a policy for protecting data (encryption) and dealing with leaks when they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You receive a notice from your wireless provider that you are about to exceed your data transmission limit for the month. What type of risk does this present?

Your account may be deactivated.

You may incur a security breach.

You may have to pay high fees.

A

You may have to pay high fees.

Going over the limit on your phone’s data plan is generally not a major risk, other than to your finances. Data overage charges can be high, depending on your provider and service plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your favorite restaurant locator app on your iPhone won’t load. You closed it and tried to reopen it a few times and it still doesn’t work. What should you try next?

Remove and reinstall the app.

Perform a force stop.

Reboot the phone and try the app again.

A

Reboot the phone and try the app again.

If an app does not load, try rebooting (forcing the device to restart, if necessary). If that does not work, attempt to remove and reload the app. Be sure to check the vendor’s site for any similar problems (and solutions) encountered by others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Windows 7 user’s antivirus software has crashed. He reboots the computer and tries to open it again, and it crashes again. What should he do to solve the problem? (Choose two.)

Look for a patch or update on the manufacturer’s website.

Delete the antivirus software.

Delete and reinstall Windows.

Repair the antivirus installation through Programs in Control Panel.

A

Look for a patch or update on the manufacturer’s website.

Repair the antivirus installation through Programs in Control Panel.

When an application crashes, you want to isolate the cause of the crash—it could be a compatibility issue, hardware, or a host of other problems—and solve it. One step to take early on is to look for updates/patches/fixes to the application released by the vendor. You can also try to repair the installation through Control Panel. If needed, you can remove and reinstall the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have a Windows 8 workstation that is spontaneously shutting down and restarting. What should you do to troubleshoot and resolve the issue?

Check the system BIOS to ensure that the boot order is set properly.

Boot to the Windows installation CD and start the Recovery Console.

Boot to Safe Mode and see whether the problem persists.

A

Boot to Safe Mode and see whether the problem persists.

Occasionally, a rogue system will begin automatically shutting down and/or restarting while in use. While it could be indicative of a hardware problem (malfunctioning motherboard, for example), it can also indicate a setting misconfiguration or driver problem. The most likely setting problem is with sleep settings, such as hibernation mode. If that’s not it, then it could be a driver. To begin ruling out possibilities, boot the system into Safe Mode and see whether the problem continues. If the problem does not occur while in Safe Mode, then boot normally and begin testing what occurs as you eliminate drivers/devices one by one (sound, video, and so forth) until you find the culprit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An iPhone user reports that her device no longer makes sound, even when she is playing videos or receives a phone call. What is the first thing you should check?

If too many applications are running

If the phone has been put into silent mode

If the connection to the speakers is still operational

A

If the phone has been put into silent mode

Occasionally, a device can be unknowingly put into silent mode, and this will keep sound from coming to the speakers, headphones, or other connected devices. When troubleshooting, always check to see that silent mode is not enabled (or the volume has been turned completely down) and restart the device if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You want to register some DLL files as command components in the Windows 8.1 Registry. Which command should you use?

REGSVR32

REGEDIT

MSCONFIG

A

REGSVR32

REGSVR32.EXE, known as the REGSVR32 tool, allows you to register and unregister modules and controls for troubleshooting purposes. It is often associated with Internet Explorer, but it can be used with any control or module. The command-line syntax is REGSVR32 DLLNAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have a Windows 7 workstation that was infected with adware. You’ve removed the adware, but now the computer is unable to connect to the Internet. It is still able to print to a local printer. What is the most likely cause of the problem?

The DNS server has been poisoned.

The malware changed the computer’s TCP/IP configuration to point to a fake DNS server.

The malware is still on the computer and has infected the boot sector.

A

The malware changed the computer’s TCP/IP configuration to point to a fake DNS server.

Malware can change more settings than you might be aware of on a computer. For example, adware might be obvious because of the pop-ups and browser redirects, but malware can also change the client-side IP settings that point to a DNS or proxy server. Check the IP configuration on the client and be sure it’s set properly

17
Q

You are dual-booting a workstation with Linux and Windows 8.1. One day when you boot up, you get a GRUB error message. What is the most likely cause of the problem?

The Linux boot loader is missing.

The MBR is missing or corrupted.

The BIOS/UEFI is missing or corrupted

A

The MBR is missing or corrupted.

In Linux, there are two common boot loaders used. LILO (LInux LOader) is the older one but has been replaced by GRUB (GRand Unified Bootloader) in most instances. The most likely cause of a GRUB/LILO error is a missing or corrupt master boot record (MBR). The method to fix it depends on the version of Linux you are running, but generally speaking, you need to boot to the Linux installation CD/DVD, go into Linux rescue mode, and re-create the MBR

18
Q

You have a user with an iPhone 6, and the user needs to restart the phone. He asks you how to perform a soft reset. What do you tell him?

Press and hold the Sleep/Wake and Home buttons for at least 10 seconds until you see the Apple logo and then let go.

Press and hold the Sleep/Wake button until the red slider appears and then drag the slider to power the device off.

Press the Home button two times, and the Home screen will appear. Swipe up to initiate a soft reset.

A

Press and hold the Sleep/Wake button until the red slider appears and then drag the slider to power the device off

A soft reset is the gentlest of the resets. In fact, it will retain data for running applications. Many iPhone users will know the soft reset as the way they turn their phone off and on normally. Press and hold the Sleep/Wake button until the red slider appears and then drag the slider to turn the device off. To turn the phone back on, press and hold the Sleep/Wake button again until you see the Apple logo

19
Q

A technician just updated the network card driver for a Windows 7 workstation. Now, the network card does not appear to work. She reboots the computer and logs back in, and it still does not work. What should she do next to resolve the issue?

Reboot using the Last Known Good configuration.

Reinstall Windows.

Open Device Manager, find the network card, and roll back the driver

A

Open Device Manager, find the network card, and roll back the driver.

If you have just updated a driver and the device isn’t functioning, rolling back the driver installation can sometimes solve the problem. To roll back a driver, right-click the device name in Device Manager and choose Properties. On the Drivers tab, click the Roll Back Driver button. The Last Known Good configuration will not work because she logged in again. It will therefore be configured with the new (presumably bad) driver

20
Q

On a Windows 8.1 workstation, the user has received a full-screen message saying that his computer has been locked because of illegal activity. The message also states that he can unlock his computer by paying a $300 fine to the government. He reboots and logs into Windows, and the message immediately reappears. What should he do to remove this message?

Open his anti-malware software and perform a remediation.

Delete and reinstall Windows.

Boot into Safe Mode and use System Restore to roll the system back to an older restore point.

A

Boot into Safe Mode and use System Restore to roll the system back to an older restore point.

He won’t be able to open his anti-malware software because the computer is locked. Paying the fine is not a good option because this is a ransomware attack. Deleting and reinstalling Windows will work, but it’s overkill. Simply boot into Safe Mode and use system restore to roll back the system. It’s not guaranteed to work, but it’s the best choice here. He could also boot to a recovery disk from his anti-malware provider (if he has one) and try a remediation

21
Q

You have recently installed new software on a Windows 7 workstation. When you try to open it, you receive an error message that the application is not compatible with Windows. What should you try first to resolve the issue?

Right-click the application and choose Troubleshoot Compatibility.

Run SFC /scannow to check for compatibility issues.

Run MSCONFIG to see whether there are system configuration settings causing the issue.

A

Right-click the application and choose Troubleshoot Compatibility.

Sometimes a driver or application will give you compatibility errors in Windows. Microsoft has provided a Program Compatibility Assistant to help you troubleshoot errors and also fix them. To use Compatibility Assistant, right-click the program and choose Troubleshoot Compatibility

22
Q

You are educating mobile users on best security practices. Which of the following are the biggest threats to network and data security? (Choose two.)

Power drains

Data transmission over-limit

Unintended Wi-Fi connections

Unintended Bluetooth connections

A

Unintended Wi-Fi connections

Unintended Bluetooth connections

Unintended Bluetooth connections, whether it means to receive unsolicited messages (called Bluejacking) or have information stolen as a result of a connection (called Bluesnarfing) is a real risk to mobile users. Unintended Wi-Fi connections also pose a significant risk if mobile users are not aware how to mitigate it