Software Troubleshooting (6) Flashcards

1
Q

While working on a Windows 8.1 workstation, a user receives a pop-up message saying that his computer has been infected with a virus and he needs to download a virus scanner now to fix it. The window does not look like it comes from the antivirus software that your company uses. What is this an example of?

Ransomware

Rogue antivirus

Hijacked antivirus

A

Rogue antivirus

One of the more clever ways of spreading a virus is to disguise it so that it looks like an antivirus program. When it alerts the user to a fictitious problem, the user then begins interacting with the program and allowing the rogue program to do all sorts of damage. One of the trickier things for troublemakers to do is to make the program look as if it came from a trusted source—such as Microsoft—and mimic the Windows Action Center interface enough to fool an unsuspecting user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have been experiencing power drains on your mobile phone recently. Which of the following is not a common cause of power drains?

Placement into airplane mode

Long periods of usage

Searching for cellular signal

A

Placement into airplane mode

All else being equal, airplane mode will actually conserve a bit of battery life because all the wireless signals are disabled. Apps, usage, and searching for a cellular signal will all drain the battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You just installed a new driver on a Windows 7 workstation, and now the operating system will not load. The manufacturer’s troubleshooting suggestion is to reboot and use the Last Known Good configuration. Where do you choose this from?

Recovery Console

Emergency Repair Disk

Safe Mode

A

Safe Mode

If when you boot Windows it won’t load completely (it hangs or is otherwise corrupted), you can often solve the problem by booting into Safe Mode. To access Safe Mode, you must press F8 when the operating system menu is displayed during the boot process. You’ll then see a menu of Safe Mode choices, one of which is Last Known Good configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have a Windows 7 workstation that will not boot properly. You suspect that the boot sector on the hard drive is corrupt. Which command in the Windows RE will allow you to create a new boot sector?

BOOTREC /FIXMBR

BOOTREC /FIXBOOT

BOOTREC /REBUILDBCD

A

BOOTREC /FIXBOOT

The BOOTREC /FIXBOOT command will rebuild the boot sector to one that is compatible with Windows 7 (or Windows 10/8.1/8). BOOTREC /FIXMBR will fix the Master Boot Record, and BOOTREC /REBUILDBCD will rebuild the BCD file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have an Android mobile phone, and the resource usage has been unusually high lately. What can you do to see whether your phone has acquired malware?

There is no malware for Android-based phones.

Download security software and use an app scanner.

Download security software and use a Wi-Fi analyzer.

A

Download security software and use an app scanner.

Many mobile security software suites have multiple security features. For example, Avast Mobile Security & Antivirus has multiple antivirus and anti-malware capabilities built in. One of the features is an app scanner, which will scan all apps for issues or potential malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You use Internet Explorer to browse the web. Starting yesterday, whenever you try to search for anything on your favorite search engine, you are always sent to the same specific website trying to sell you stuff. This happens regardless of what you are searching for. Which two things are most likely to cause this to happen? (Choose two.)

Your computer has an invalid certificate.

Your computer has malware that is causing browser redirection.

The DNS server has been poisoned.

The search engines you use have been compromised.

A

Your computer has malware that is causing browser redirection.

The DNS server has been poisoned.

Browser redirection happens any time you try to visit a site and your browser instead sends you to an alternate site. One of two things is causing this. First, and most likely, you have some sort of malware that is redirecting your browser. Removing it can be as simple as uninstalling a program by using Programs in Control Panel, or it might require virus (malware) mitigation. The second possibility is that the DNS server you use (likely your ISP’s) has been poisoned. If this happened, your ISP would be attempting to fix it as soon as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Windows 7 workstation on your network is exhibiting slow performance. Which of the following tools should be used to check for a potential problem causing the slowdown?

Anti-malware software

Event Viewer

MSCONFIG

A

Anti-malware software

A computer slowdown could happen because of many things, such as hardware failure, an excessively full hard drive, not enough virtual memory, or malware. Run a scan from anti-malware software to see whether there are any issues. Event Viewer, MSCONFIG, and REGSRV32 are useful troubleshooting tools but not typically used for system slowdowns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are consulting for a high school that is deploying iPads to its students for in-school use. The iPads all need to have identical configurations. Which service should you use to configure these devices?

iConfigure

Apple Configurator

Apple Installer

A

Apple Configurator

Apple Configurator simplifies mass configuration and deployment on iPhone, iPad, and iPod Touch devices. It is intended for use by schools, businesses, and institutions that need to deploy specific configurations to multiple devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have installed a new network card driver, and it’s not working properly. According to the manufacturer’s website, you need to edit a setting in the Windows configuration database. Which tool should you use to do that?

WINCONFIG

REGSVR32

REGEDIT

A

REGEDIT

The Windows configuration database is known as the Registry. It consists of five “hives,” which essentially hold information about all of the hardware, software, configurations, and users associated with the given machine. REGEDIT is the command that opens the Registry Editor and will allow you to make changes to it, but be careful! Changes made here are immediate and a mistake can be disastrous. Be sure to back up the Registry before making any changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are trying to apply Windows Updates to a Windows 8.1 client computer. The update fails with this message: “Failure configuring Windows updates. Reverting changes.” What should you do next?

Wait until changes are reverted. Reboot the computer and try the update again.

Immediately turn off the computer. Reboot and try the update again.

Ignore the update.

A

Wait until changes are reverted. Reboot the computer and try the update again.

If an OS update fails, it could be a configuration issue or simply a one-time glitch in the process. Wait until Windows Update reverts the changes and then reboot and try the update again. If that does not work, you can unplug removable media from your computer and try again, or you can try the Windows Update Troubleshooter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You installed a new anti-malware software package on a Windows 8.1 workstation. Now the system does not seem to run normally. It’s very slow and seems to hang often, and the anti-malware program will not open. You want to roll the system back to a previous configuration to see whether that removes the problem. Where do you do this?

System Restore

Backup And Restore

Windows RE

A

System Restore

A restore point is a copy, or snapshot, of your system configuration at a given point in time. It’s like a backup of your configuration but not your data. Snapshots are created within Windows from the System Restore program. If Windows will not load, Safe Mode can be used to run rstrui.exe, which will open a version of System Restore so you can use a snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network user with a Microsoft Phone wants to back up her device. Which service should she use to do this?

Google Sync

OneDrive

Office 365

A

OneDrive

OneDrive is Microsoft’s cloud implementation for end users. It will allow the user to sync her phone and back it up to the cloud. She can also access the data from other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technician is fixing a Windows 7 workstation that has contracted a virus. He is following the best practices for malware removal and has enabled system restore and created a restore point. What is the next step he should take?

Educate the end user.

Disable system restore.

Quarantine the infected system.

A

Educate the end user.

The best practice for malware removal is a seven-step process. Identify malware symptoms, quarantine the infected system, disable system restore (in Windows), remediate infected systems (including update anti-malware software and scan and remove the malware), schedule scans and run updates, enable system restore and create a restore point (in Windows), and educate the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user reports an application has been crashing on his mobile device. He says an error pop-up window appears briefly, but he is unable to read it. What would you be your next step?

Wait for the next crash to read the error pop-up yourself.

Install and run a screen recorder to capture the next pop-up.

Check the application log for error messages.

A

Check the application log for error messages.

Whatever message was appearing in the pop-up window is likely in the mobile application log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A user reports her PC crashed when she tried to start a new application. She says an error pop-up window appeared but she needed to close it to continue. How can you find that pop-up information?

Right-click on application to look for any help.

Check the system and application logs for errors.

Check the application on another user’s PC.

A

Check the system and application logs for errors.

The system and application logs should contain valuable information about the cause of the crash. Logs detailing events regarding the system and the applications and their security can be found in the Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user reports the printer was working fine yesterday but is no longer working. Last night, he updated the printer drivers assuming he should always have the most up-to-date drivers installed. What is the likely fix for this problem?

Roll back device driver.

Update the boot order.

Update network settings.

A

Roll back device driver.

Given the description, it might be best to roll back the printer driver to a known good version. Updating the boot order and network settings have no impact on the printer working. Killing any printer-related tasks may not have any impact

17
Q

The company has recently made changes to infrastructure services such as DNS. The new DNS information is available but not yet propagated to all workstations. Since then, a number of users have reported they are no longer able to browse for internal servers. What should each affected user do? (Choose two)

Disable their software firewall.

Reboot.

Update network settings.

Safe boot

A

Reboot.

Update network settings.

Updating the network settings manually or rebooting should apply the new network information. Disabling the firewall or booting to safe mode will not help the issue

18
Q

Your Windows 10 PC is acting poorly after you installed a few poorly written applications. Now the system will not function properly. You want to refresh your Windows installation but still keep your personal files. Where do you choose this from?

Recovery Console

Emergency Repair Disk

Safe Mode

A

Safe Mode

In Windows 10, you can enter Safe Mode by hitting Restart while holding the Shift button. Windows 10 will restart into Safe Mode. From there, you can install a clean copy of Windows through the Refresh Windows tool. This tool is found under Settings in the Update And Security category. Within Update And Security, choose Recovery, then More Recovery Options to refresh the Windows installation but opting to keep personal files

19
Q

A user reports the PC was fine until an OS update was installed. Believing that all updates are necessary, the user voluntarily updated the system himself. However, the update was not yet tested and is found to be incompatible with a needed business application. What is your next step?

Roll back the update.

Update the business application.

Do nothing; have the user take awareness training.

A

Roll back the update.

Given the description, it might be best to roll back the update. Until the business application and update can be proven compatible, the update cannot be installed as is. Killing the task is not acceptable as it may be a necessary task, such as explorer.exe.

20
Q

A user reports that his Windows 10 Start menu looks wrong. You know the environment relies on roaming profiles. What is a reliable solution to the user’s problem?

Rebuild the desktop image.

Rebuild the Windows user profile.

Delete the Registry on the local machine.

A

Rebuild the Windows user profile.

The solution to rebuild Windows profiles will fix the issue. Roaming profiles, especially with Windows 10, tend to experience problems, which can be most reliably fixed by rebuilding the Windows profile

21
Q

While booting up a Windows 8 PC, you find it takes a long time at the Welcome screen. The message “Waiting for the User Profile Service” appears on an error message window. What might be the problem?

Slow profile load

Update service cannot start.

A peripheral is not connected as expected.

A

Slow profile load

One common indicator is that the profile loads slowly while the system is booting

22
Q

Besides a blue screen of death, what evidence of an operating system crash does Windows provide?

Red X seen across the screen

Black screen of death

Blue error code across the desktop

A

Black screen of death

The black screen of death signifies a complete operating system crash. It first appeared with Windows 3.x and still occurs in Windows 7 and 8 when the OS has trouble booting. The more common indication of an OS crash is the blue screen of death, which provides an error code, unlike the black screen of death