CompTIA (Software Troubleshooting Practice Test)
A customer complains that he is continuously receiving e-mail responses to things he never sent. What happened to his computer system?
Malware has hijacked his e-mail account and is now sending e-mail through his account. These messages could also be a result of spoofing or phishing, but those are not answer choices.
A user calls the hotline to ask where he might see his Linux system's error logs. On a Linux system, what is the most common location for these files?
Most releases of Linux store error files in the /var/log directory.
A customer called and asked to view all the current logs on his Winodws system. What program would allow users to look at logs?
The Event Viewer not only displays the events running but also errors, log files, and system warnings, which are all very useful in troubleshooting.
You've just successfully removed all viruses from a computer system. The seventh and last step in CompTIA A+'s "Best Practice for Removing Malware" is ____, according to CompTIA A+ specifications.
The final step in the best practices for removing malware would be to educate the end users. Inform them of any company policies regarding email and Internet usage.
A user claims that his hard drive is running very slowly and is affecting the system's performance. The hard drive is less than half full, according to him. What recommendations do you have for speeding up his hard drive?
There is a good chance that the files on his drive have become fragmented. The user should defragment the drive, unless he is using a solid-state drive (SSD), which should never be defragmented.
A user receives a notification stating "Limited Connectivity" after connecting to a new wireless network. What could be the source of this issue?
Limited connectivity is a type of network issue that occurs when the computer can see the network, but there is an issue with the connection. One common cause of this issue is when the computer isn’t getting an IP address from a DHCP server.
A client requests access to the system registry file in order to read, search, or even alter it. What suggestions do you have?
Regedit allows users to view, search, and edit the system registry file. Be certain to explain to the client the issues with editing the registry.
What is the first step you should do to remove malware according to best practices?
The best practice for the removal of malware is to perform these steps in order: 1. identify and research malware symptoms 2. quarantine infected system 3. disable system restore 4. remediate infected systems 5. schedule scans and run updates 6. enable system restore 7. educate the end user.
Although a user has successfully set up dual displays on his computer, the mouse does not track correctly from one screen to the next. Describe the procedure for resolving this problem.
The monitors must be realigned. Right-click on desktop and select Display Settings, drag the screens to properly orient them so the mouse will track from screen to screen in normal order.
When a user starts his computer web browser, he receives many pop-ups. What type of malicious software could it be?
Any software program in which advertising banners are displayed while the program is running is referred to as adware.
To view logs on an iOS device, which of these programs is needed?
To view logs on an iOS device, you would need the Xcode application.
A user is having trouble connecting his Bluetooth headphones to his smartphone. Which of the following should the user try first?
The first step to troubleshooting Bluetooth connectivity issues is very basic; you should confirm that you have Bluetooth turned “on” on the device in question. If it is on, then sometimes toggling it off and back on can help. Steps like rebooting should come a little later in the troubleshooting process.
A technician detected malware on a user's computer after investigating symptoms that appeared on the computer. What is the technician's next course of action?
The steps for malware removal are as follows: 1. identify and research malware symptoms 2. quarantine the infected system 3. disable system restore 4. remediate the infected system 5. schedule scan and run updates 6.enable system restore and create a restore point 7. educate the user
Disappearing files may indicate ____ .
Certain types of malware can cause files to disappear either by deleting them or simply renaming them.
A technician wants to look at the logs on his Android smartphone. What program could the technician use to look at these logs?
To view logs on an Android device, you could use the application Logcat.
When a user launched a web browser, she observed that the website did not appear like her usual home page. She also discovered that her default search engine had been replaced by a third-party service she had never heard of. What kind of attack is this user most likely to experience?
If you find your browser has been changed, or that the results of a search come from a third-party site, it is likely that your browser has been redirected by malware.
This is known as ____. It occurs when a user believes they are downloading a legitimate antivirus program, but the antivirus program turns out to be malware.
When malware is disguised as a legitimate antivirus, this is known as a rogue antivirus.
It takes an extremely long time for a user's computer to boot up. What can be done to help resolve the issue?
Having too many programs run upon startup can cause a computer to start up much slower than is desirable. One solution is to navigate to the Task Manager and disable any startup programs that are not needed.
Which of these can help in the prevention of phishing attacks?
Phishing attacks are a type of spam email. Spam filters can help to cut down on the amount of phishing emails that are received.
A technician wants to restart a service to see whether it fixes an application problem. Where can he restart the service?
To restart a service, open Services.msc. In the services menu, search for the service in question. In the left panel there should be an option to restart the service.
A user is having problems with a frozen program and wants to terminate it. What is the location where the user can perform this action?
If an application freezes or will not close, ending the task from Task Manager is often a quick way to resolve these issues. To end a task, launch Task Manager and locate the application in question. When the application is located, click “End Task”.
A technician helps a person access safe mode on their computer. The Windows operating system on the computer is an older version. To enter safe mode, what key should the user repeatedly press during the initial boot?
Booting a Windows computer into Safe Mode or Safe Mode with Networking will boot the computer with only the necessary configuration. Safe Mode boots the system with only drivers absolutely necessary to do so. If you suspect problems with drivers, or need to modify system settings that are otherwise unavailable due to booting issues, Safe Mode can help. To enter Safe Mode, repeatedly press F8 during initial boot.
On their mobile phone's touch screen, a user is having inaccurate touch response issues. The problem persists even after performing a hard reset on the device. What will be the user's next step?
To resolve inaccurate touch screen response issues, perform a hard reset of the device. If that fails, replace the digitizer.
How many failed login attempts on Apple iOS mobile phones will cause the device to erase everything internally if enabled?
On Apple iPhones, if you have the security setting enabled, ten failed login attempts will cause the device to erase everything internally. This feature is disabled by default, but can be enabled in your Touch or Face ID settings for enhanced protection.
A technician needs to use a bootable USB drive to start a computer. They want to do so by changing the computer's boot sequence. To modify the boot order, where can this technician go?
At times, it is necessary to boot to a different location than the default. The boot order can be changed in the BIOS of the device.