CompTIA Software Troubleshooting Practice Test 2

0%

A technician wants to look at the logs on his Android smartphone. What program could the technician use to look at these logs?

Correct! Wrong!

To view logs on an Android device, you could use the application Logcat.

Which of the following network locations disables network discovery in Windows Vista?

Correct! Wrong!

In Windows Vista, the "public" network location disables network discovery. When a network is set as "public," the system assumes it is a potentially unsafe location, and network discovery is turned off by default to enhance security. This prevents the computer from being visible to other devices on the network and vice versa.

Identify the three major categories of mobile applications.

Correct! Wrong!

Correct answer: Native Application, Cloud Application, Local Application

All of the many sorts of applications, such as gaming apps, business apps, educational apps, and so on, fit into one of the three categories listed above.

To view logs on an iOS device, which of these programs is needed?

Correct! Wrong!

To view logs on an iOS device, you would need the Xcode application.

Disappearing files may indicate ____ .

Correct! Wrong!

Certain types of malware can cause files to disappear either by deleting them or simply renaming them.

A user is having trouble connecting his Bluetooth headphones to his smartphone. Which of the following should the user try first?

Correct! Wrong!

The first step to troubleshooting Bluetooth connectivity issues is very basic; you should confirm that you have Bluetooth turned “on” on the device in question. If it is on, then sometimes toggling it off and back on can help. Steps like rebooting should come a little later in the troubleshooting process.

This is known as ____. It occurs when a user believes they are downloading a legitimate antivirus program, but the antivirus program turns out to be malware.

Correct! Wrong!

When malware is disguised as a legitimate antivirus, this is known as a rogue antivirus.

When a user starts his computer web browser, he receives many pop-ups. What type of malicious software could it be?

Correct! Wrong!

Any software program in which advertising banners are displayed while the program is running is referred to as adware.

Which editions of Windows 7 can create a HomeGroup? (choose four)

Correct! Wrong!

Which mobile device management deployment model makes use of corporate-owned devices and prescribes software installation and maintenance actions?

Correct! Wrong!

Correct answer: COBO

Company Owned, Business Only (COBO) devices are entirely owned and controlled by the organization. BYOD (bring your own device) indicates that the employee owns the gadget. Choose your own device (CYOD) indicates that the business keeps ownership of the device, but workers may put personal apps on it. COPE, or company-issued, personally-enabled, is similar to CYOD, except workers are restricted to installing only white-listed applications.

It takes an extremely long time for a user's computer to boot up. What can be done to help resolve the issue?

Correct! Wrong!

Having too many programs run upon startup can cause a computer to start up much slower than is desirable. One solution is to navigate to the Task Manager and disable any startup programs that are not needed.

What is the name of the area at the bottom of a Mac OS X screen where, by default, a bar of crucial icons appears?

Correct! Wrong!

The area at the bottom of a macOS screen where, by default, a bar of crucial icons appears is called the "Dock." The Dock is a prominent feature of the macOS graphical user interface and serves as a quick-launch bar for frequently used applications and a place to access minimized windows, the Trash bin, and other shortcuts. Users can easily add or remove icons on the Dock to customize it according to their preferences and workflow. It provides a convenient way to access essential apps and system functions with just a single click.

What is a packet filter?

Correct! Wrong!

A packet filter, also known as a network firewall, is a security mechanism used to control the flow of network traffic based on a set of predefined rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. The main purpose of a packet filter is to prevent unauthorized packets from entering the network and to allow or deny traffic based on specific criteria.

A technician detected malware on a user's computer after investigating symptoms that appeared on the computer. What is the technician's next course of action?

Correct! Wrong!

The steps for malware removal are as follows: 1. identify and research malware symptoms 2. quarantine the infected system 3. disable system restore 4. remediate the infected system 5. schedule scan and run updates 6.enable system restore and create a restore point 7. educate the user

Which is an online site, requiring Windows 8 or higher, where you can download apps, games, software, and more?

Correct! Wrong!

"Microsoft Store" rather than "Windows Store." The Microsoft Store is an online platform provided by Microsoft for users running Windows 8 or higher, where they can download and install a wide variety of apps, games, software, movies, TV shows, and more. It serves as the official app store for Windows devices and offers both free and paid applications and content.

You prefer to work on your laptop rather than your 4G tablet. Wi-Fi is available on your laptop. What would you put on your laptop to keep connected while traveling?

Correct! Wrong!

Correct answer: Cellular card

Adding a cellular card to your laptop would allow you to communicate over the cellular network. Bluetooth would not provide reliable connectivity. A Wi-Fi extension lacks the range to facilitate travel. GPS will only allow you to locate your laptop.

What can you do if a program is not responding to any commands and appears to be locked up?

Correct! Wrong!

When a user launched a web browser, she observed that the website did not appear like her usual home page. She also discovered that her default search engine had been replaced by a third-party service she had never heard of. What kind of attack is this user most likely to experience?

Correct! Wrong!

If you find your browser has been changed, or that the results of a search come from a third-party site, it is likely that your browser has been redirected by malware.

Click for next FREE CompTIA Test
CompTIA Software Troubleshooting Test #3

Premium Tests $49/mo
FREE November-2024