Troubleshooting Operating Systems and Security Flashcards

1
Q

In Windows, which utility is responsible for finding, downloading and installing Windows patching?

Device Manager

Download Manager

Windows Update

A

Windows Update

Windows Update is responsible for downloading and installing Windows service packs, patches, and security updates. Device Manager is used to view devices installed on the operating system. The Microsoft Management Console is a console that allows snap-ins for management. Download Manager is a component of Internet Explorer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Startup Setting option allows you to boot with basic drivers?

Enable Debugging

Enable Safe Mode

Enable Low-resolution Video

A

Enable Safe Mode

Enable Safe Mode allows you to boot with basic drivers and minimal startup of nonessential services. Enable Debugging is used by kernel developers. Disable Driver Signature Enforcement is used to allow an unsigned driver to load during boot. Enable Low-resolution Video will boot the operating system into a VGA mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which bootrec option can be used in Windows to rebuild the boot configuration file?

/FIXBOOT

/REBUILDBCD

/SCANOS

A

/REBUILDBCD

The /REBUILDBCD option can be used with the bootrec tool to rebuild the boot configuration data (BCD). The /FIXBOOT option writes a new boot sector to the system partition. The /SCANOS scans all other partitions that are found to have Windows installations. The /FIXMBR writes a new master boot record (MBR) to the partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the first step in the troubleshooting process for applications?

Establish a theory

Identify the problem

Verify functionality

A

Identify the problem

The most important step is the first step: Identify the problem. Once you’ve identified the problem, you can then establish a theory. After a fix is in place, you should verify functionality. The final step is to document findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which tool do you use to create a restore point in Windows?

Windows Backup

Windows Recovery Environment

Windows Preinstallation Environment

A

Windows Recovery Environment

The Windows Recovery Environment allows you to create a restore point. Windows Backup restores only user data, not the Windows operating system. Previous Version is used with Volume Shadow Copy (VSS). Windows Preinstallation Environment is the mini-Windows version used for installation of Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following components are only used to restore Windows from a suspected state?

ntoskrnl. exe
winload. exe
winresume. exe

A

winresume.exe

Winresume.exe is used to load Windows from a suspended state. The Boot Configuration Data (BCD) is used to direct Windows to boot the proper installation. Ntoskrnl.exe is the Windows kernel. Winload.exe is used for the normal booting of the Windows operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One of the users you support has a Windows 10 laptop that will not boot up. The user just installed brand new drivers for a graphics card. They need to access a tax application and their data files. What should you try first?

System Restore

Reset This PC

Manually reinstall Windows 10

A

System Restore

The System Restore option should be used first to restore the operating system to an earlier point before the problem. This will restore the device back to a previous state before the installation of the drivers. System Restore will not affect user data files. Reset This PC will roll back the PC to a period before the tax application was installed. Reimaging the laptop will erase all programs and data files. Manually reinstalling Windows 10 will erase all programs and data files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which partitioning type is required when you have UEFI firmware?

GPT

MBR

POST

A

GPT

When you have UEFI firmware, it is required to have the disk setup with a GUID Partition Table (GPT) partitioning type. The standard master boot record (MBR) partitioning type can be used with BIOS. Power on self-test (POST) is a routine the BIOS or firmware performs to test hardware before boot. The Boot Sector is contained on both MBR and GPT partitioning types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are used to prevent pop-unders from appearing?

Anti-malware utilities

Pop-up blockers

Phishing sites

A

Pop-up blockers

Pop-up blockers are used to prevent pop-ups and pop-unders from appearing. Anti-malware utilities will remove and prevent malware. Phishing sites are used to collect users credentials’ by tricking users. Antivirus software is used to protect the operating system from viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In general, how often should you update your antivirus definitions?

Weekly

Monthly

Daily

A

Daily

Antivirus definitions should be updated daily, because new viruses are identified by the minute. Updating antivirus definitions weekly or monthly will open you up to the possibility of infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of your users claims that their hard drive seems to be running slowly. Which tool can you use to check to see how fragmented the hard drive is?

Disk Analyzer

Disk Cleanup

Optimize Drives

A

Optimize Drives

The Optimize Drive tool allows you to analyze and optimize disks for fragmentation. Disk Analyzer is not a tool. Disk Cleanup is a tool used to clean up space on a drive. Chkdsk is a tool used to check for drive errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which tool will allow you to diagnose why Windows Update keeps failing?

Windows Update Troubleshooter

Windows Recovery Environment

Safe Mode

A

Windows Update Troubleshooter

Windows Update Troubleshooter can assist in diagnosing problems with Windows Update. The ntbtlog.txt file is used to diagnose problems with bootup. Windows Recovery Environment is used for problems with Windows outside of problems of Windows Updates. Safe Mode is a boot mode that loads minimal drivers and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following programs could be considered anti-malware?

Windows Defender Security

Windows Action Centre

Virus Total

A

Windows Defender Security

Windows Defender Security is considered anti-malware and antivirus protection for the Windows operating system. Mobile device management (MDM) software is used to manage mobile devices. Windows Action Center is a notification center for action to be taken in the operating system. VirusTotal is a third-party site that analyzes virus signatures, but it does not protect you from them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following tools allows you to manually fix maliciously modified system files?

SFC

bootrec

UAC

A

SFC

The System File Checker (SFC) allows you to manually scan for modified operating system files and repair them. Regedit is used to modify the Registry. Bootrec is used to repair the boot records on an operating system installation. User Account Control (UAC) is used to control access to administrative credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following can you do to help to eliminate security problems?

Establish security policies procedures

Optimize drives

Prevent booting into Safe Mode

A

Establish security policies procedures

Establishing security policies and procedures will help to eliminate security problems and guide employees on what to do if they arise. Optimizing drives will defragment drives and has no consequence to security. Preventing booting into Safe Mode will only hinder diagnostics. Preventing booting into Windows Recovery Environment will hinder diagnostics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A mobile device is running out of RAM. What could be the most likely problem?

The device is not charged to capacity

The device is in DND mode

The device has background application open

A

The device has background application open

The device most likely has too many background applications open, using RAM. That the device is not charged to capacity would not affect RAM. A digitizer not functioning properly would resemble inaccurate touch screen responses. If the device were in Do Not Disturb mode, the speakers would not work

17
Q

What is a risk of using auto reconnect feature on a mobile device?

The device will reconnect to any SSID

The device could be exploited by an evil twin attack

The device’s battery life could be shortened

A

The device could be exploited by an evil twin attack

If auto reconnect is configured on an SSID, the device could be susceptible to an evil twin attack, in which the device connects to any device with the same SSID. The device will not reconnect to any SSID, only the SSID configured as auto reconnect. Battery life will remain unaffected with auto reconnect. Over limits can be avoided with auto reconnect, because the wireless network is used for data usage

18
Q

What is a potential security issue with WAPs running on full signal power?

Client signal drops

Signals propagating past the physical organization’s perimeter

Data transmission over limits

A

Signals propagating past the physical organization’s perimeter

The potential security issue with WAPs running on full power is eavesdropping outside of the organization’s physical perimeter. Client signal drops would not be effected by WAPs running in a high power mode. Data transmission over limits by clients would not be affected. Unauthorized location tracking would not be affected

19
Q

Which is an example of possible unauthorized account access?

A login during normal business hours

A login to two different locations during normal hours

A login outside of business hours

A

A login outside of business hours

A login outside of business hours is the best example of possible unauthorized account access. A login during normal business hours is normal. A login to two different locations during normal business hours could be normal, as long as it is not at the same time. A failed attempt at entering the proper password is not an example of a possible unauthorized account access

20
Q

What is one consequence of an overheating mobile device?

Higher Ram usage

Degraded battery life

Inaccurate touch screen response

A

Degraded battery life

Degraded battery life can be expected from an overheating mobile device, if the problem persists for a long time. Higher RAM usage will not occur with overheating, but it could be a cause of overheating. Inaccurate touch screen responses are not a symptom or consequence of overheating. The inability to decrypt emails depends on having the proper certificate installed