Troubleshooting Theory, OSs, and Security Flashcards
In Mode, Windows loads only basic drivers, such as a standard VGA video driver and the keyboard and mouse.
Safe
Holds information about which OSs are installed on the computer.
BOOT.INI
Windows 8/7/Vista use ____ in place of the BOOT.INI file, and it is configured with ___.
Boot Configuration Data (BCD)
BCDEDIT.EXE.
In Windows XP, ____ parses the system for hardware information each time Windows is loaded. This information is then used to create dynamic hardware information in the Registry.
NTDETECT.COM
On a Windows XP system with a SCSI boot device, this file is used to recognize and load the SCSI interface.
NTBOOTDD.SYS
The solution to a corrupted NTOSKRNL.EXE file is to ____
boot from a startup disk and replace the file from the setup media.
System files come into the picture next. In addition to the previously listed files, all of which (except ____ are located in the root of the C:
NTOSKRNL.EXE)
In Windows 8/7/Vista, ____ replace NTLDR/NTDETECT.COM.
WINLOAD.EXE and WINRESUME.EXE
are software components that parse the Registry for configuration information and start needed services and drivers.
Executive subsystems
____ are software components that parse the Registry for configuration information and start needed services and drivers.
Executive subsystems
___ are software programs that tell the operating system how to work with the hardware.
Device drivers
In Windows, the ____ feature has the sole purpose of keeping the user from running programs that could pose a potential threat if the user’s privileges were equal to that of Administrator.
User Account Control (UAC)
Over time, systems seem to run slower than they once did. This can be due to a plethora of drivers, lots of background processes, memory hogs, or many other possibilities. The first place to turn for help to troubleshoot this problem is the ____
Performance Troubleshooter.
The ____ will look for common problems, such as more than one virus detection program running, multiple users logged into the same machine, visual settings affecting performance, and so on.
Performance Troubleshooter
When a file fails to open, it is often due to ____.
corruption.
The ___ loader file is a key component of the Windows XP boot process and the system will not boot without it.
NTLDR
the text file ___ is used to identify the operating systems installed, their locations, and the boot options to use.
BOOT.INI
Windows 8, Windows 7, and Windows Vista use the Windowsfile ___ instead of the NTLDR file and a similar message that this file is missing will appear. To resolve this problem, you can boot into System Recovery Options and choose Startup Repair (or type ___ at the command prompt).
Boot Configuration Data (BCD)
BOOTREC /REBUILDBCD
If you are using ____ or ___ as a multiboot loader, you can encounter problems if they become corrupted or deleted. To solve these problems, you need to re-create the loader (and reconfigure it for your system) to be able to use it.
GRUB (GRand Unified Bootloader)
LILO (LInux LOader)
The purpose of this utility is to keep the operating system alive and well. ___ automatically verifies system files after a reboot to see if they were changed to unprotected copies.
SFC.EXE
Allows you to set the location of an offline boot directory that can then be used for offline repair
/OFFBOOTDIR
Allows you to set the location of an offline Windows directory that can then be used for offline repair
/OFFWINDIR
Specifies a file to be scanned and repaired if needed
/SCANFILE
Checks system files now and repairs any problems found
/SCANNOW
Specifies a file to be scanned but not repaired if errors are found
/VERIFYFILE
Specifies that files are scanned but not repaired if errors are found
/VERIFYONLY
The utility ___ does a job similar to BOOTREC /REBUILDBCD, and it is a bit easier to work with.
BOOTCFG
____, known as the ___ tool, allows you to register and unregister modules and controls for troubleshooting purposes.
REGSVR32.EXE
REGSVR32
Disables automatic restarting and is helpful when troubleshooting.
Disable Automatic Restart On System Failure
Sends information through the serial port for interpretation/troubleshooting at another computer.
Debugging Mode
Both ____ and ___ are pages or sites that you did not specifically request and may only display ads or bring up applets that should be avoided.
pop-ups & pop-unders
____ is a form of redirection in which traffic intended for one host is sent to another.
Pharming
___ is defined as any unwanted, unsolicited email, and not only can the sheer volume of it be irritating, it can often open the door to larger problems.
Spam
Recently, the word spam has found its way into other forms of unwanted messaging beyond email, giving birth to the acronyms ____ and ____.
SPIM (SPam over Instant Messaging)
SPIT (SPam over Internet Telephony)
The process of running an antivirus program on a computer is known as ___ the computer against a virus.
inoculating
There are two categories of viruses: ___ & ___.
benign and malicious
___ viruses don’t do much besides replicate themselves and exist.
Benign
___ viruses, on the other hand, are designed to destroy things.
Malicious
___ was added to Windows, and it allows you to create restore points to make recovery of the operating system easier.
System Restore
To open System Restore, click Start ➢ ___ – ___ – ___ – ___. By clicking Next, you can choose a restore point.
All Programs ➢ Accessories ➢ System Tools ➢ System Restore
What are the seven steps for Malware removal?
- Identify malware symptoms.
- Quarantine infected system.
- Disable System Restore (in Windows).
- Remediate infected systems.
- Schedule scans and run updates.
- Enable System Restore and create a restore point (in Windows).
- Educate the end user.
____ analyzer gives a complete graphical representation of traffic and signals and is useful in detecting security related issues.
Cell tower