System Issues Flashcards

(35 cards)

1
Q

What does the booting process include?

A

When the booting process begins, which involves loading the operating system into the system’s memory to prepare it for use. Once the computer is powered up and the operating system is loaded, the BIOS or UEFI firmware checks and initializes hardware components. A system will use either UEFI or BIOS, note both, since UEFI is a replacement for BIOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is UEFI?

A

UEFI stands for Unified Extensible Firmware Interface, and modern systems typically use it due to its enhanced capabilities and support for newer technologies.

In UEFI, a preboot environment allows users to manage and modify system configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the bootloader phase?

A

The bootloader phase occurs once the firmware identifies the boot device, the bootloader takes over, loading the OS kernel into memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the kernel initialization phase?

A

Within kernel initialization, the kernel sets up the environment for the OS to operate and manages essential services. The kernel acts as a bridge between applications and the physical hardware, ensuring that software instructions are executed efficiently and safely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are common boot and startup issues?

A

Common causes include disk errors, failed updates, and malware attacks. It may be necessary to reinstall or repair the bootloader to address the issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you repair common boot and startup issues?

A

To repair the bootloader, you can use tools like Window’s bootrec and commands like bootrec/fixmbr, and bootrec/fixedboot. In Linux, GRUB repair can fix corrupted bootloaders. Next, damaged or incompatible hardware, such as a faulty hard drive, defective RAM or failing motherboard can impede the boot process.

Testing or replacing the hardware components may be required. You should also check hardware connections to ensure that all cables and components are securely connected. Disconnect and reconnect peripheral devices to rule out external issues.

Furthermore, misconfigured boot order or secure boot settings can lead to boot issues. It is essential to ensure that the correct boot device is selected and secure boot is appropriately configured.

Accessing BIOS or UEFI settings allows you to check and adjust the boot order, ensuring the primary boot device is correctly selected. If necessary, you should disable secure boot.

In correct system settings such as invalid registry entries or broken system files can also cause boot failures. You can run diagnostic tools like system file checker and check disk in windows or fsck in Linux to check for and repair file system errors.

Finally, incompatible or corrupt drivers can prevent the system from booting properly. Updating drivers or booting into safe mode to disable problematic drivers can resolve this. When you boot into safe mode, the system boots with minimal drivers and services, helping you to isolate software issues.

If other methods fail, reinstalling the operating system may be required as a last resort. Before proceeding with this process, you should double check that data backups are available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some preventative measures to boot and startup issues?

A

For example, regular system maintenance, such as performing routine hardware checks can identify potential problems before they become critical. Monitoring tools like SMART, which stands for self-monitoring analysis and reporting technology can alert you to potential hard drive failures and enable timely data backups, and updating firmware and hardware drivers can enhance compatibility and improve system stability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can software be managed to correct boot and startup issues?

A

On the software side, you should keep the operating system and install software up to date to prevent security vulnerabilities and compatibility issues. Regularly create system restore points or disk images to provide a fallback option for unexpected failures.

Implement redundancy through rate setups or backup systems for servers and critical systems to mitigate data loss and ensure continuous operations.

A ray setup or redundant array of independent disks is a storage technology that integrates multiple physical hard drives into one cohesive system.

Finally, using reliable antifier software and avoiding untrusted downloads can protect the system from malicious software that could corrupt essential boot files or disrupt startup operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is safe mode?

A

Safe Mode is a diagnostic boot mode designed to start the computer with a minimal set of drivers and services required for basic operation. This stripped-down version of the operating system allows users to troubleshoot and diagnose issues that may be affecting system performance. Safe Mode is crucial for isolating and resolving issues, such as malware infections, driver conflicts, or faulty applications, which may not be easily identified during a regular boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the (4) key characteristics for safe mode?

A

-Minimal driver load
-No third-party applications:
-Diagnostics
-Safe Mode variants in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the (5) uses of safe mode?

A

-Troubleshooting startup issues
-Malware removal
-Driver problems
-System restore and recovery
-System configuration and settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are uses for system recovery options?

A

-Data backup
-System updates
-Disk errors
(chkdsk (Windows) and Disk Utility (macOS))
(For Linux, fsck is the utility used to check and repair
file systems.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is User Account Control (UAC)?

A

User account control (UAC) is a security feature introduced by Microsoft in Windows Vista and has since been included in subsequent versions of the Windows operating system. Its primary purpose is to mitigate the impact of malware by limiting application permissions and providing users with a mechanism to control changes to their system. UAC is designed to enhance the security of Windows by separating standard user privileges from administrative rights, which helps to prevent unauthorized modifications to the operating system and protects users from potentially malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the functionality of User Account Control (UAC)?

A

At its core, UAC differentiates between standard and administrative tasks. By default, even administrative users are treated as standard users. This means that when an application requires elevated privileges to perform a task, it must explicitly request permission. The user is then presented with a UAC prompt to allow or deny the requested action.

The UAC prompt appears in two main forms, depending on the privileges of the user:

Consent prompt: For users with administrative privileges, the prompt asks the user to confirm that they wish to proceed with the action. This is a simple Yes/No prompt.

Credential prompt: For users with standard privileges, the prompt requires the user to enter the credentials of an account with administrative privileges.

This layered approach ensures that users are made aware of potentially risky actions. Applications running with standard user privileges can’t silently escalate their privileges or make system-wide changes without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the (4) core features of User Access Control (UAC)?

A

-Elevation requests
-File and registry virtualization
-Secure desktop
-Application compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the importance of User Access Control (UAC)?

A

UAC plays a crucial role in improving the security posture of Windows by enforcing the principle of least privilege. This security principle advocates that users and applications should operate with the minimum privileges required for their tasks.

17
Q

What are the (4) benefits of User Access Control (UAC)?

A

-Reduced attack surface
-Improved system stability
-Enhanced user awareness:
-Compatibility and flexibility

18
Q

What are the (4) User Access Control (UAC) policies and configuration?

A

-Always notify
-Notify me only when programs try to make changes
to my computer
-Notify me only when programs try to make changes
to my computer (Do Not Dim My Desktop)
-Never notify

19
Q

How does the User Control Access (UAC) use the integrity and and application impact?

A

UAC operates by utilizing the Windows integrity mechanism, which categorizes processes into different integrity levels based on their privileges and trustworthiness. This integrity model is essential in defining the level of access granted to processes, ensuring that only authorized actions receive elevated privileges.

20
Q

What are the (4) integrity levels of User Control Access (UAC)?

A

-Low integrity
-Medium “
-High “
-System “

21
Q

What is the role of application compatibility database?

A

The Windows application compatibility database is crucial in determining how UAC handles legacy applications. This database contains compatibility data for numerous applications, enabling UAC to identify programs that may require elevation, even if they don’t have an explicit manifest file indicating compatibility with newer Windows versions. The database helps prevent older applications from unintentionally requiring administrative privileges due to outdated design practices.

22
Q

What is the role of application manifest files?

A

Application manifest files explicitly state the application’s requirements for elevation and compatibility information. A manifest file may contain an asInvoker, highestAvailable, or requireAdministrator attribute, guiding UAC on how to handle the application.

23
Q

What are the (3) parts of application manifest files?

A

-asInvoker
-highestAvailable
-requireAdministrator

24
Q

What are the (3) parts to installing a legacy application?

A

-UAC checks for manifest and database entry
-Elevation prompt:
-File and registry virtualization

25
What are the (3) most common user account problems?
-Forgetting passwords -Account locks (after several failed attempts) -Insufficient permissions
26
Why are security logs important?
Reviewing security logs is crucial for diagnosing issues related to unauthorized access or unexpected changes in permissions. Tools like Windows Event Viewer provide detailed logs that can help trace the root cause of such issues. Auditing can be configured to log-specific events, such as log in attempts and resource access, which can then be analyzed to identify and rectify security breaches.
27
What are other ways to assist with user account and permission issues?
-3rd party tools -Reg updating/auditing user permissions -Educating users -Automation tools (ie MS ID Manager or Okta Automate)
28
What is the most common activation problems?
-Invalid product keys -Hardware changes -Connectivity problems -A suspected invalid product key
29
What are common log/authentication issues?
One issue is when a user is unable to log in at all. Users may face issues logging in to Windows, due to forgotten passwords, corrupted user profiles, or system errors that prevent the login screen from functioning properly Another issue is that after multiple failed login attempts, user accounts can become locked as a security measure. This requires intervention to unlock the account. In a domain environment, administrators can use the Microsoft Management Console to unlock accounts
30
What is system restore?
System Restore allows users to revert their computer's state, including system files, installed applications, Windows Registry, and system settings, to a previous point in time. This capability is crucial for recovering from system malfunctions or other problems that arise after installing new programs, drivers, or updates. System Restore operates by creating "restore points" at specific intervals or before significant system changes. These restore points act as snapshots of your system at a particular moment, capturing the state of system files and settings. When a user initiates a system restore, Windows reverts the system to the state captured in the chosen restore point, effectively undoing any changes made since that time.
31
What are the benefits of System Restore?
The benefits of System Restore are numerous. It provides a non-destructive recovery option that can roll back system changes without affecting personal files such as documents, pictures, or videos. This feature makes it an invaluable tool for users who need to resolve system issues without losing their data. System Restore is also easy to use and doesn't require advanced technical knowledge. This accessibility makes it a suitable solution for users of all skill levels. Additionally, System Restore can prevent the need for a complete OS reinstallation, saving both time and effort. The ability to create both automatic and manual restore points adds to its flexibility, allowing users to ensure that a restore point is available before making significant changes to the system.
32
What is System File Checker (SFC)?
SFC is a Windows utility that allows users to scan for and restore corrupted or missing system files. It ensures the integrity of system files by replacing incorrect versions with the correct Microsoft versions. This tool is vital for maintaining the stability and functionality of the operating system, especially when issues arise due to corrupted or missing files.
33
What are System File Checker (SFC) benefits?
System File Checker offers several benefits. First and foremost, it ensures the integrity of all system files, preventing various system errors that could arise from corrupted or missing files. The utility's ability to automatically repair these files restores system stability and functionality. Regular use of SFC can help prevent issues before they become critical, maintaining overall system health. Additionally, it provides comprehensive coverage by scanning all protected system files, ensuring thorough verification and repair.
34
How is the DISM utilized for advanced repair?
DISM can be used to mount and service Windows images before deployment, manage drivers and features, and fix corrupted Windows system files. It's a powerful tool for IT professionals and system administrators for maintaining and repairing Windows installations.
35
What are the (5) best practices for system maintence?
-Regularly create restore points -Periodic SFC scans -Regular backups -Regular updates -Use Safe Mode