Chapter 24 ■ Troubleshooting Operating Systems and Security Flashcards Preview

Comptia A+ > Chapter 24 ■ Troubleshooting Operating Systems and Security > Flashcards

Flashcards in Chapter 24 ■ Troubleshooting Operating Systems and Security Deck (20)
Loading flashcards...
1
Q
  1. In Windows, which utility is responsible for finding, downloading, and installing
    Windows patches?
    A. Device Manager
    B. Microsoft Management Console
    C. Download Manager
    D. Windows Update
A

D. Windows Update

2
Q
  1. Which Startup Setting option allows you to boot with basic drivers?
    A. Enable Debugging
    B. Enable Safe Mode
    C. Disable Driver Signature Enforcement
    D. Enable Low-resolution Video
A

B. Enable Safe Mode

3
Q
  1. Which bootrec option can be used in Windows to rebuild the boot configuration file?
    A. /FIXBOOT
    B. /REBUILDBCD
    C. /SCANOS
    D. /FIXMBR
A

B. /REBUILDBCD

4
Q
  1. What is the first step in the troubleshooting process for applications?
    A. Establish a theory.
    B. Identify the problem.
    C. Verify functionality.
    D. Document findings.
A

B. Identify the problem.

5
Q
  1. Which tool do you use to create a restore point in Windows?
    A. Windows Backup
    B. Previous Version
    C. Windows Recovery Environment
    D. Windows Preinstallation Environment
A

C. Windows Recovery Environment

6
Q
  1. Which of the following components are only used to restore Windows from a suspended
    state?
    A. BCD
    B. ntoskrnl.exe
    C. winload.exe
    D. winresume.exe
A

D. winresume.exe

7
Q
  1. One of the users you support has a Windows 10 laptop that will not boot up. The user just
    installed brand new drivers for a graphics card. They need to access a tax application and
    their data files. What should you try first?
    A. System Restore
    B. Reset This PC.
    C. Reimage the laptop.
    D. Manually reinstall Windows 10.
A

A. System Restore

8
Q
  1. Which partitioning type is required when you have UEFI firmware?
    A. GPT
    B. MBR
    C. POST
    D. Boot Sector
A

A. GPT

9
Q
  1. Which of the following are used to prevent pop-unders from appearing?
    A. Anti-malware utilities
    B. Pop-up blockers
    C. Phishing sites
    D. Antivirus software
A

B. Pop-up blockers

10
Q
  1. In general, how often should you update your antivirus definitions?
    A. Weekly
    B. Monthly
    C. Daily
    D. Antivirus definitions do not need to be updated.
A

C. Daily

11
Q
  1. One of your users claims that their hard drive seems to be running slowly. Which tool can
    you use to check to see how fragmented the hard drive is?
    A. Disk Analyzer
    B. Disk Cleanup
    C. Optimize Drives
    D. chkdsk
A

C. Optimize Drives

12
Q
  1. Which tool will allow you to diagnose why Windows Update keeps failing?
    A. ntbtlog.txt
    B. Windows Update Troubleshooter
    C. Windows Recovery Environment
    D. Safe Mode
A

B. Windows Update Troubleshooter

13
Q
  1. Which of the following programs could be considered anti-malware?
    A. Windows Defender Security
    B. MDM
    C. Windows Action Center
    D. VirusTotal
A

A. Windows Defender Security

14
Q
  1. Which of the following tools allows you to manually fix maliciously modified system files?
    A. regedit
    B. SFC
    C. bootrec
    D. UAC
A

B. SFC

15
Q
  1. Which of the following can you do to help to eliminate security problems? (Select the best
    answer.)
    A. Establish security policies and procedures.
    B. Optimize drives.
    C. Prevent booting into Safe Mode.
    D. Prevent booting into Windows Recovery Environment.
A

A. Establish security policies and procedures.

16
Q
  1. A mobile device is running out of RAM. What could be the most likely problem?
    A. The device is not charged to capacity.
    B. The digitizer is not functioning properly.
    C. The device is in DND mode.
    D. The device has background applications open.
A

D. The device has background applications open.

17
Q
  1. What is a risk of using the auto reconnect feature on a mobile device?
    A. The device will reconnect to any SSID.
    B. The device could be exploited by an evil twin attack.
    C. The device’s battery life could be shortened.
    D. You may exceed your cellular data plan’s limits.
A

B. The device could be exploited by an evil twin attack.

18
Q
  1. What is a potential security issue with WAPs running on full signal power?
    A. Client signal drops.
    B. Signals propagating past the physical organization’s perimeter
    C. Data transmission over limits
    D. Unauthorized location tracking
A

B. Signals propagating past the physical organization’s perimeter

19
Q
  1. Which is an example of possible unauthorized account access? (Choose the best answer.)
    A. A login during normal business hours
    B. A login to two different locations during normal hours
    C. A login outside of business hours
    D. A failed attempt at entering a password
A

C. A login outside of business hours

20
Q
  1. What is one consequence of an overheating mobile device?
    A. Higher RAM usage
    B. Degraded battery life
    C. Inaccurate touch screen response
    D. Inability to decrypt emails
A

B. Degraded battery life