CompTIA Software Troubleshooting Practice Test #1
A customer complains that he is continuously receiving e-mail responses to things he never sent. What happened to his computer system?
Malware has hijacked his e-mail account and is now sending e-mail through his account. These messages could also be a result of spoofing or phishing, but those are not answer choices.
A user calls the hotline to ask where he might see his Linux system's error logs. On a Linux system, what is the most common location for these files?
Most releases of Linux store error files in the /var/log directory.
A customer called and asked to view all the current logs on his Winodws system. What program would allow users to look at logs?
The Event Viewer not only displays the events running but also errors, log files, and system warnings, which are all very useful in troubleshooting.
You've just successfully removed all viruses from a computer system. The seventh and last step in CompTIA A+'s "Best Practice for Removing Malware" is ____, according to CompTIA A+ specifications.
The final step in the best practices for removing malware would be to educate the end users. Inform them of any company policies regarding email and Internet usage.
A user claims that his hard drive is running very slowly and is affecting the system's performance. The hard drive is less than half full, according to him. What recommendations do you have for speeding up his hard drive?
There is a good chance that the files on his drive have become fragmented. The user should defragment the drive, unless he is using a solid-state drive (SSD), which should never be defragmented.
A user receives a notification stating "Limited Connectivity" after connecting to a new wireless network. What could be the source of this issue?
Limited connectivity is a type of network issue that occurs when the computer can see the network, but there is an issue with the connection. One common cause of this issue is when the computer isn’t getting an IP address from a DHCP server.
A client requests access to the system registry file in order to read, search, or even alter it. What suggestions do you have?
Regedit allows users to view, search, and edit the system registry file. Be certain to explain to the client the issues with editing the registry.
What is the first step you should do to remove malware according to best practices?
The best practice for the removal of malware is to perform these steps in order: 1. identify and research malware symptoms 2. quarantine infected system 3. disable system restore 4. remediate infected systems 5. schedule scans and run updates 6. enable system restore 7. educate the end user.
Although a user has successfully set up dual displays on his computer, the mouse does not track correctly from one screen to the next. Describe the procedure for resolving this problem.
The monitors must be realigned. Right-click on desktop and select Display Settings, drag the screens to properly orient them so the mouse will track from screen to screen in normal order.