A+1102 3.0 Software Troubleshooting Flashcards
A software engineer is troubleshooting a team laptop and discovers that several case management tools are out-of-date. What action should the engineer take to get the applications to the latest version?
YOU WERE SURE AND CORRECT
Update the application.
A cyber technician successfully captures the user profile for a computer that is demonstrating performance issues. The technician moves this profile onto a new computer for the employee’s use. What is this called?
YOU WERE SURE AND CORRECT
Reimage the device.
A cyber architect is reviewing a help ticket in which an employee is complaining that their computer halts during boot up or stops working in the middle of a session. When asked specifically what the computer was doing, the employee stated that the device simply stopped what it was doing and displayed a crash screen with a frowning face. What is the employee observing from the computer?
YOU WERE SURE AND CORRECT
Blue screen of death
A cyber technician is troubleshooting a company computer that exhibits performance issues. What steps should the technician take in their troubleshooting strategy? (Select all that apply.)
Check for misconfigurations.
Verify the problem.
Check for overheating.
A cyber intern needs to create a living record of tech complaints presented by the organization’s employees. The issue with the highest number of complaints is application crashes. What is unique to application crashes?
YOU WERE SURE AND CORRECT
It occurs when a program stops unexpectedly.
A software engineer is reviewing a help ticket where an employee can not access their account due to corrupted files but has to regain the data. What method allows the engineer to take uncorrupted data and place it in a new account for the employee?
YOU WERE SURE AND CORRECT
Rebuild a Windows profile.
A cyber architect is reviewing a ticketed computer and discovers that the newest driver is corrupted and wants to revert to a good driver. What can the architect do to complete this task?
THE CORRECT ANSWER
Roll back an update.
A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?
YOU WERE UNSURE AND CORRECT
Restart services.
An employee reports an issue in which they state they cannot print. The help desk technician discovers that the employee uses a peripheral hub with four additional devices connected via a single connector to the computer. What is causing the issue with the printer?
THE CORRECT ANSWER
USB controller resource warning
A technician receives a request from an employee via a help ticket. The employee wants to return their computer to a former installation setting. What is the employee requesting the technician to complete?
YOU WERE SURE AND CORRECT
Restore the computer.
A cyber engineer identifies a disk drive while working on a computer, but the loader does not reflect the location. What computer issue is the engineer observing in this instance?
YOU WERE SURE AND CORRECT
No OS found
An organizational employee is having computing issues while attempting to run several applications simultaneously. What is the employee experiencing in this instance?
YOU WERE SURE AND CORRECT
Low memory warning
A cyber architect troubleshoots a computer with the message that reflects “OS not found.” What recovery mode command prompts repair of the master boot record (MBR)?
YOU WERE SURE AND CORRECT
bootrec/fixmbr
A cyber architect wants to enhance their work computer for better optimization, storage space, and speed efficiency. What can the architect consider to meet the desired optimization outcome?
YOU WERE SURE AND CORRECT
Add resources.
A software engineer troubleshoots an “OS not found” issue on a company computer and wants to repair the boot sector. What recovery mode command prompt can the engineer use to accomplish this troubleshooting task?
YOU WERE SURE AND CORRECT
bootrec/fixboot
A cyber architect analyzes a computer returned for application and performance issues. As part of their analysis, the architect uses a utility that has a manual interface to review system files and restores stored files if found to be corrupt or damaged. What is the architect using to test files?
THE CORRECT ANSWER
SFC
A software engineer is experiencing issues with a work computer and identifies that the computer does not have the memory or video graphics necessary to operate the program. What should the engineering review to ensure the program works correctly?
THE CORRECT ANSWER
Verify requirements.
A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop?
Restart services.
A cyber consultant reviews the help ticket log and notices several computers submitted for repairs due to being out of sync with other systems. What is the consultant observing in the log?
THE CORRECT ANSWER
Time drift
A technician is troubleshooting an organizational computer that is continually restarting without any action from the user. What is the computer doing?
YOU WERE SURE AND CORRECT
Rebooting
A maintenance engineer is troubleshooting a computer that is out of sync. What is the cause for the computer’s inability to sync?
THE CORRECT ANSWER
Time drift
A software engineer is reviewing the various concerns associated with certificate warnings. What are common issues tied to certificate warnings? (Select all that apply.)
It has expired or is listed as revoked.
It is self-signed or issued by a CA that is not trusted.
The FQDN requested by the browser is different from the subject name listed.
An employee works on their company computer and receives a push notification to download and install software to remain compliant. Upon clicking the link in the notification window, malware inserts into the device. What message did the employee receive?
THE CORRECT ANSWER
Desktop alert
A cyber architect reviews desktop symptoms and wants to learn more about file system errors and anomalous behaviors. Which are NOT considered symptoms of security issues in the file system? (Select all that apply.)
Certificate warnings
Desktop alerts