Software Troubleshooting (6) Flashcards
While working on a Windows 8.1 workstation, a user receives a pop-up message saying that his computer has been infected with a virus and he needs to download a virus scanner now to fix it. The window does not look like it comes from the antivirus software that your company uses. What is this an example of?
Ransomware
Rogue antivirus
Hijacked antivirus
Rogue antivirus
One of the more clever ways of spreading a virus is to disguise it so that it looks like an antivirus program. When it alerts the user to a fictitious problem, the user then begins interacting with the program and allowing the rogue program to do all sorts of damage. One of the trickier things for troublemakers to do is to make the program look as if it came from a trusted source—such as Microsoft—and mimic the Windows Action Center interface enough to fool an unsuspecting user
You have been experiencing power drains on your mobile phone recently. Which of the following is not a common cause of power drains?
Placement into airplane mode
Long periods of usage
Searching for cellular signal
Placement into airplane mode
All else being equal, airplane mode will actually conserve a bit of battery life because all the wireless signals are disabled. Apps, usage, and searching for a cellular signal will all drain the battery
You just installed a new driver on a Windows 7 workstation, and now the operating system will not load. The manufacturer’s troubleshooting suggestion is to reboot and use the Last Known Good configuration. Where do you choose this from?
Recovery Console
Emergency Repair Disk
Safe Mode
Safe Mode
If when you boot Windows it won’t load completely (it hangs or is otherwise corrupted), you can often solve the problem by booting into Safe Mode. To access Safe Mode, you must press F8 when the operating system menu is displayed during the boot process. You’ll then see a menu of Safe Mode choices, one of which is Last Known Good configuration
You have a Windows 7 workstation that will not boot properly. You suspect that the boot sector on the hard drive is corrupt. Which command in the Windows RE will allow you to create a new boot sector?
BOOTREC /FIXMBR
BOOTREC /FIXBOOT
BOOTREC /REBUILDBCD
BOOTREC /FIXBOOT
The BOOTREC /FIXBOOT command will rebuild the boot sector to one that is compatible with Windows 7 (or Windows 10/8.1/8). BOOTREC /FIXMBR will fix the Master Boot Record, and BOOTREC /REBUILDBCD will rebuild the BCD file
You have an Android mobile phone, and the resource usage has been unusually high lately. What can you do to see whether your phone has acquired malware?
There is no malware for Android-based phones.
Download security software and use an app scanner.
Download security software and use a Wi-Fi analyzer.
Download security software and use an app scanner.
Many mobile security software suites have multiple security features. For example, Avast Mobile Security & Antivirus has multiple antivirus and anti-malware capabilities built in. One of the features is an app scanner, which will scan all apps for issues or potential malware
You use Internet Explorer to browse the web. Starting yesterday, whenever you try to search for anything on your favorite search engine, you are always sent to the same specific website trying to sell you stuff. This happens regardless of what you are searching for. Which two things are most likely to cause this to happen? (Choose two.)
Your computer has an invalid certificate.
Your computer has malware that is causing browser redirection.
The DNS server has been poisoned.
The search engines you use have been compromised.
Your computer has malware that is causing browser redirection.
The DNS server has been poisoned.
Browser redirection happens any time you try to visit a site and your browser instead sends you to an alternate site. One of two things is causing this. First, and most likely, you have some sort of malware that is redirecting your browser. Removing it can be as simple as uninstalling a program by using Programs in Control Panel, or it might require virus (malware) mitigation. The second possibility is that the DNS server you use (likely your ISP’s) has been poisoned. If this happened, your ISP would be attempting to fix it as soon as possible
A Windows 7 workstation on your network is exhibiting slow performance. Which of the following tools should be used to check for a potential problem causing the slowdown?
Anti-malware software
Event Viewer
MSCONFIG
Anti-malware software
A computer slowdown could happen because of many things, such as hardware failure, an excessively full hard drive, not enough virtual memory, or malware. Run a scan from anti-malware software to see whether there are any issues. Event Viewer, MSCONFIG, and REGSRV32 are useful troubleshooting tools but not typically used for system slowdowns
You are consulting for a high school that is deploying iPads to its students for in-school use. The iPads all need to have identical configurations. Which service should you use to configure these devices?
iConfigure
Apple Configurator
Apple Installer
Apple Configurator
Apple Configurator simplifies mass configuration and deployment on iPhone, iPad, and iPod Touch devices. It is intended for use by schools, businesses, and institutions that need to deploy specific configurations to multiple devices
You have installed a new network card driver, and it’s not working properly. According to the manufacturer’s website, you need to edit a setting in the Windows configuration database. Which tool should you use to do that?
WINCONFIG
REGSVR32
REGEDIT
REGEDIT
The Windows configuration database is known as the Registry. It consists of five “hives,” which essentially hold information about all of the hardware, software, configurations, and users associated with the given machine. REGEDIT is the command that opens the Registry Editor and will allow you to make changes to it, but be careful! Changes made here are immediate and a mistake can be disastrous. Be sure to back up the Registry before making any changes
You are trying to apply Windows Updates to a Windows 8.1 client computer. The update fails with this message: “Failure configuring Windows updates. Reverting changes.” What should you do next?
Wait until changes are reverted. Reboot the computer and try the update again.
Immediately turn off the computer. Reboot and try the update again.
Ignore the update.
Wait until changes are reverted. Reboot the computer and try the update again.
If an OS update fails, it could be a configuration issue or simply a one-time glitch in the process. Wait until Windows Update reverts the changes and then reboot and try the update again. If that does not work, you can unplug removable media from your computer and try again, or you can try the Windows Update Troubleshooter
You installed a new anti-malware software package on a Windows 8.1 workstation. Now the system does not seem to run normally. It’s very slow and seems to hang often, and the anti-malware program will not open. You want to roll the system back to a previous configuration to see whether that removes the problem. Where do you do this?
System Restore
Backup And Restore
Windows RE
System Restore
A restore point is a copy, or snapshot, of your system configuration at a given point in time. It’s like a backup of your configuration but not your data. Snapshots are created within Windows from the System Restore program. If Windows will not load, Safe Mode can be used to run rstrui.exe, which will open a version of System Restore so you can use a snapshot
A network user with a Microsoft Phone wants to back up her device. Which service should she use to do this?
Google Sync
OneDrive
Office 365
OneDrive
OneDrive is Microsoft’s cloud implementation for end users. It will allow the user to sync her phone and back it up to the cloud. She can also access the data from other devices
A technician is fixing a Windows 7 workstation that has contracted a virus. He is following the best practices for malware removal and has enabled system restore and created a restore point. What is the next step he should take?
Educate the end user.
Disable system restore.
Quarantine the infected system.
Educate the end user.
The best practice for malware removal is a seven-step process. Identify malware symptoms, quarantine the infected system, disable system restore (in Windows), remediate infected systems (including update anti-malware software and scan and remove the malware), schedule scans and run updates, enable system restore and create a restore point (in Windows), and educate the end user
A user reports an application has been crashing on his mobile device. He says an error pop-up window appears briefly, but he is unable to read it. What would you be your next step?
Wait for the next crash to read the error pop-up yourself.
Install and run a screen recorder to capture the next pop-up.
Check the application log for error messages.
Check the application log for error messages.
Whatever message was appearing in the pop-up window is likely in the mobile application log
A user reports her PC crashed when she tried to start a new application. She says an error pop-up window appeared but she needed to close it to continue. How can you find that pop-up information?
Right-click on application to look for any help.
Check the system and application logs for errors.
Check the application on another user’s PC.
Check the system and application logs for errors.
The system and application logs should contain valuable information about the cause of the crash. Logs detailing events regarding the system and the applications and their security can be found in the Event Viewer