COMPTIA A+ CORE 2 Software Troubleshooting
A cyber technician follows the CompTIA best practice procedure on malware removal and is ready to remediate one of the company's infected systems. What tools are synonymous in remediating infected systems? (Select all that apply.) A. Antivirus software B. Anti-malware software C. Quarantine D. Sandbox
A. Antivirus software B. Anti-malware software
A cyber architect is reviewing a help ticket in which an employee is complaining that their computer halts during boot up or stops working in the middle of a session. When asked specifically what the computer was doing, the employee stated that the device simply stopped what it was doing and displayed a crash screen with a frowning face. What is the employee observing from the computer? A. Blue screen of death B. Frequent shutdowns C. Sluggish performance D. Boot problems
A. Blue screen of death
A technician is trying to troubleshoot a system impacted by malware. According to the CompTIA best practice procedure, what should also be done as a safety precaution when disabling system restore points? A. Delete old system restore points and backup copies. B. Update the anti-malware software. C. Use scanning and removal techniques. D. Schedule a scan and run updates.
A. Delete old system restore points and backup copies.
A technician reviews step 2 of the CompTIA best practice procedure for malware removal. While quarantining infected systems, what should the technician do first? A. Disconnect the network link. B. Scan attached removable media devices for malware. C. Move the infected system to a sandbox. D. Update anti-malware software.
A. Disconnect the network link.
A consultant is troubleshooting a system reported as being infected by malware. The office's protocol is to follow the CompTIA best practice procedure. According to the procedure, what considerations should the consultant place while quarantining the infected system? (Select all that apply.) A. Disconnect the network link. B. Move the infected system to a sandbox. C. Schedule scans and run updates. D. Scan attached removable media devices for malware.
A. Disconnect the network link. B. Move the infected system to a sandbox. D. Scan attached removable media devices for malware.
A cyber consultant is troubleshooting a mobile device that is having application issues. The consultant opens an application and cannot get it to stop. What is the consultant observing? A. Fails to close. B. Fails to launch. C. Slow to respond. D. Fails to update.
A. Fails to close.
A company employee is working on their business computer and receives a message on their display advising that if they do not immediately install the application provided in the security message, their computer will shut down and lose all data. Out of concern, the employee downloads the software and is later a victim of the malware. What did the employee receive? A. Fake security warnings B. High network traffic C. High number of ads D. Sluggish response
A. Fake security warnings
An employee is working on their company computer and begins getting pop-up notifications. Which notifications would be considered desktop alerts? (Select all that apply.) A. Immediate download B. An advertisement C. Software install and upgrade D. Push notification
A. Immediate download C. Software install and upgrade D. Push notification
A cyber architect is writing a paper on root activity security concerns and the use of developer mode. What are the characteristics of placing a device into developer mode? (Select all that apply.) A. It can be purposely misused to install bootleg applications. B. It enables users to obtain root privileges, sideload applications, and customize interfaces. C. It should be used only for application development. D. It makes advanced configuration settings and log data available.
A. It can be purposely misused to install bootleg applications. C. It should be used only for application development. D. It makes advanced configuration settings and log data available.
After an employee goes to the help desk and requests to "jailbreak" their company phone, the help desk sends out information to all employees discussing the risks of "jailbreaking" devices. What are the tenets of "jailbreaking"? (Select all that apply.) A. It involves subverting the security controls built into the OS to gain unrestricted system-level access. B. It has the side effect of leaving many security measures permanently disabled. C. It can no longer be assumed to run a trusted OS. D. It makes advanced configuration settings and log data available.
A. It involves subverting the security controls built into the OS to gain unrestricted system-level access. B. It has the side effect of leaving many security measures permanently disabled. C. It can no longer be assumed to run a trusted OS.
A technician is troubleshooting connectivity issues on a mobile device where the employee is complaining that they can not complete near-field communication (NFC). How can an NFC issue be described? A. It occurs when a device cannot make payments through a contactless card reader. B. It occurs when the recipient is not on the contact list. C. It occurs when paired devices are not in range. D. It occurs when the device is outside the range of the router.
A. It occurs when a device cannot make payments through a contactless card reader.
A cyber technician is troubleshooting an employee's company mobile phone where the employee is complaining that several of the applications are failing to launch. What best describes a failure to launch? A. It occurs when the device does not open an application once initiating the execution command. B. It occurs when the application fails to stop after being prompted. C. It occurs when the system does not accept the latest update. D. It occurs when resources are inadequate or the app is badly written.
A. It occurs when the device does not open an application once initiating the execution command.
A cyber engineer identifies a disk drive while working on a computer, but the loader does not reflect the location. What computer issue is the engineer observing in this instance? A. No OS found B. Low memory warning C. Time drift D. USB controller resource warning
A. No OS found
A cyber associate reviews the company policy on troubleshooting desktop symptoms of malware infection. What is a key indicator that malware infection has occurred in security-related applications? A. OS update failure B. No access to network C. Certificate warning D. Desktop alert
A. OS update failure
A software engineer is reviewing a help ticket where an employee can not access their account due to corrupted files but has to regain the data. What method allows the engineer to take uncorrupted data and place it in a new account for the employee? A. Rebuild a Windows profile. B. Restore a device. C. Roll back an update. D. Reimage a device.
A. Rebuild a Windows profile.
A cyber consultant has disabled the system restore feature in Windows. According to the CompTIA best practice procedure for malware removal, what is the next step for malware removal? A. Remediate infected systems. B. Quarantine the infected systems. C. Schedule scan and run updates. D. Disable system restore in Windows.
A. Remediate infected systems.
A technician is reviewing open-source literature on redirection. What type of malware exploits a target page to capture authentication details? A. Spyware B. Frequent pop-ups C. Adware D. Certificate warnings
A. Spyware
software engineer is reviewing the various concerns associated with certificate warnings. What are common issues tied to certificate warnings? (Select all that apply.) A. The FQDN requested by the browser is different from the subject name listed. B. It changes or deletes targeted files. C. It has expired or is listed as revoked. D. It is self-signed or issued by a CA that is not trusted.
A. The FQDN requested by the browser is different from the subject name listed. C. It has expired or is listed as revoked. D. It is self-signed or issued by a CA that is not trusted.
A helpdesk technician receives a computer in their triage department where the customer is complaining that their device is constantly rebooting at random times. What could be causing the random reboots? (Select all that apply.) A. The device has a low battery charge. B. The device has a faulty battery or other hardware. C. The device is overheating. D. Applications are failing to close.
A. The device has a low battery charge. B. The device has a faulty battery or other hardware. C. The device is overheating.
A cyber consultant is reviewing the company's policy on security issues. What are symptoms associated with security issues within file systems? (Select all that apply.) A. The device has altered system files. B. The device is displaying a message requiring immediate action. C. The devices files have been renamed. D. The device is unable to access the network.
A. The device has altered system files. C. The devices files have been renamed.
An employee is trying to purchase a USB device from the help ticket center and is getting frustrated as they have issues with the NFC feature on the phone. What should the employee consider as a means to troubleshoot the NFC issue? (Select all that apply.) A. The device is unlocked and NFC is enabled. B. The device's Bluetooth is enabled for a communication link. C. The NFC sensor is supported and enabled in the wallet app. D. The device is not in airplane mode.
A. The device is unlocked and NFC is enabled. C. The NFC sensor is supported and enabled in the wallet app. D. The device is not in airplane mode.
An engineer is reviewing the various symptoms associated with malware infections. What is NOT a symptom associated with security system errors? A. The files of data have been modified by name or are missing B. Permissions for files have been modified C. The system files have been altered D. The host cannot access the network or network performance is slow
A. The files of data have been modified by name or are missing
A maintenance engineer is troubleshooting a computer that is out of sync. What is the cause for the computer's inability to sync? A. Time drift B. No OS found C. Low memory warning D. USB controller resource warning
A. Time drift
A software engineer is working on a computer where the employee states that the application works correctly but continually displays a message prompt asking the user to grant access to the computer's camera for program operations. The employee does not understand why they are receiving the messages as the program does not require a camera. What type of activity is the employee describing? A. Unexpected application behavior B. Security concerns C. Spoofing D. Fake security warnings
A. Unexpected application behavior
A cyber technician removes malware from the organization's system and follows the guidance presented by CompTIA. While remediating the infected system, what should the technician be doing? A. Update the anti-malware software. B. Quarantine the infected systems. C. Disable system restore in Windows. D. Remediate infected systems.
A. Update the anti-malware software.
A software engineer is experiencing issues with a work computer and identifies that the computer does not have the memory or video graphics necessary to operate the program. What should the engineering review to ensure the program works correctly? A. Verify requirements. B. Check time drift. C. Repair Windows. D. Run System File Checker.
A. Verify requirements.
A cyber architect wants to enhance their work computer for better optimization, storage space, and speed efficiency. What can the architect consider to meet the desired optimization outcome A. Restart service. B. Add resources. C. Uninstall applications. D. Reboot.
B. Add resources.
A cyber technician is drafting a memorandum to advise employees of current risks associated with using the internet. One of the topics in this memorandum focuses on site redirection. What type of malware has a blunt means of driving traffic through a site? A. Spyware B. Adware C. Certificate warning D. Frequent pop-ups
B. Adware
A software custodian is troubleshooting an employee's mobile device. What type of issue occurs when a file transfer between iOS and macOS devices is not permitted because the recipient is not on the contact list? A. Bluetooth B. AirDrop C. NFC D. Wi-Fi
B. AirDrop
A software technician is reviewing a help ticket in which an employee is frustrated that they were working on a project and the program stopped working unexpectedly. What did the employee experience in this instance? A. Slow profile load B. Application crashes C. System instability D. Service not starting
B. Application crashes
A cyber technician is troubleshooting a company computer that exhibits performance issues. What steps should the technician take in their troubleshooting strategy? (Select all that apply.) A. Check RTC battery. B. Check for misconfigurations. C. Verify the problem. D. Check for overheating.
B. Check for misconfigurations. C. Verify the problem. D. Check for overheating.
A software engineer troubleshoots an employee's mobile device, complaining that the screen will not auto-rotate. The engineer has completed the first step prescribed by CompTIA to correct the issue and is moving to the next step. What is the second step in CompTIA's recommendations for troubleshooting auto-rotate issues? A. Consider that some apps can only be used in a single orientation. B. Check that the user is not touching any part of the screen as this will prevent rotation. C. Make sure the battery is charged to perform the requested action. D. Use the notification drawer or Control Center to check that rotation lock is not enabled.
B. Check that the user is not touching any part of the screen as this will prevent rotation.
A help ticket consultant completes the troubleshooting methods prescribed by CompTIA for a device that the user is saying will not auto-rotate from vertical to horizontal viewing. The consultant has completed steps one and two and is moving to the final step. What is the final step in CompTIA's troubleshooting for devices that fail to auto-rotate? A. Use the notification drawer or Control Center to check that rotation lock is not enabled. B. Consider that some apps can only be used in a single orientation. C. Check that the user is not touching any part of the screen as this will prevent rotation. D. Make sure the battery is charged to perform the requested action.
B. Consider that some apps can only be used in a single orientation.
A cyber architect is working on removing malware from a corporate computer and elects to review the CompTIA seven-step best practice procedure for malware removal to develop a standard operating procedure for the cyber office. What is the first step of the best practice procedure? A. Disable system restore in Windows. B. Investigate and verify malware symptoms. C. Quarantine infected symptoms. D. Update anti-malware software.
B. Investigate and verify malware symptoms.
A cyber technician explores the various types of notifications that they can observe on the organization's computers. What is unique to desktop alerts? A. It is a notification that attempts to ruse the user. B. It is a notification advising immediate action. C. It is an unapproved notification on the display. D. It is a notification that a website may be untrustworthy.
B. It is a notification advising immediate action.
An employee becomes frustrated by the number of unsolicited instances the employee receives a notification. What is an unwanted operating system (OS) notification? A. It is a notification that a website may be untrustworthy and may pose an increased risk. B. It is a notification that appears on the display that was not prompted by the user. C. It is a notification that attempts to ruse the user into thinking their device has been infected. D. It is a notification that alerts the user for immediate action.
B. It is a notification that appears on the display that was not prompted by the user.
An employee is working on a company computer and begins receiving several unusual antivirus warnings. What is important to know about false antivirus warnings? A. It is a notification that alerts the user to take immediate action. B. It is a notification that attempts to ruse the user into downloading nefarious content under false premises. C. It is a notification that appears on the display that was not prompted by the user. D. It is a notification that a website may be untrustworthy and may pose an increased risk.
B. It is a notification that attempts to ruse the user into downloading nefarious content under false premises.
An employee is receiving training on best practices associated with surfing the internet. What is common with frequent pop-ups? A. It occurs when a website is viewed that has potential risk. B. It occurs when advertisements or notifications appear on the display that were not wanted. C. It occurs when antivirus messages are displayed for deceptive purposes. D. It occurs when a message is sent to the user requesting immediate response.
B. It occurs when advertisements or notifications appear on the display that were not wanted.
A technician is troubleshooting an employee's company mobile device where the employee is complaining that several of the applications are failing to close. What causes a failure to close? A. It occurs when the device does not open an application once the execution command has been initiated. B. It occurs when the application fails to stop after being prompted. C. It occurs when the system does not accept the latest version/patch. D. It occurs when resources are inadequate or the app is badly written.
B. It occurs when the application fails to stop after being prompted.
A cyber intern is troubleshooting connectivity issues associated with a mobile device's inability to connect to the Wi-Fi. What can cause this type of issue? A. It occurs when the recipient is not on the contact list. B. It occurs when the device is outside the range of the router. C. It occurs when paired devices are not in range. D. It occurs when a device cannot make payments through a contactless card reader.
B. It occurs when the device is outside the range of the router.
A cyber intern starts their first day and wants to read the latest organizational announcement, including a discussion on spoofing. What is a tenet of spoofing? A. Malware may be collecting data in the background. B. It typically masquerades as a legitimate application. C. Malware may be corrupting the domain name system. D. It allows applications to be downloaded and installed from untrusted external third-party sources.
B. It typically masquerades as a legitimate application.
A cyber engineer is troubleshooting a device failing to update the OS. What steps can the engineer consider while troubleshooting the device? (Select all that apply.) A. Check to ensure the Bluetooth is enabled for a communication link. B. Restart the device and then try the update again. C. Check that there is sufficient free space on the device. D. Use the vendor site to verify that the update is compatible with the device model.
B. Restart the device and then try the update again. C. Check that there is sufficient free space on the device. D. Use the vendor site to verify that the update is compatible with the device model.
A technician receives a request from an employee via a help ticket. The employee wants to return their computer to a former installation setting. What is the employee requesting the technician to complete? A. Reboot the computer. B. Restore the computer. C. Restart services on the computer. D. Reimage the computer.
B. Restore the computer.
A technician is working on removing malware from a company system. While following the steps presented in CompTIA's best practice procedure for malware removal, the technician moves from investigating and verifying malware symptoms to disabling system restore points in Windows. What step did the technician skip in this scenario? A. Fifth step B. Second step C. Sixth step D. Seventh step
B. Second step - Quarintine the system
A cyber architect is removing malware per CompTIA's best practice procedure. Upon re-enabling system restore points in Windows, the architect closes the ticket and considers the task complete. What did the architect fail to complete? A. Fifth step B. Seventh step C. Second step D. Sixth step
B. Seventh step - Educate the end user
A helpdesk ticket specialist uses CompTIA's malware removal procedure while working on a company system. The specialist successfully runs scans and updates and begins preparing a document to educate end-point users. What step did the specialist omit from CompTIA's best practice procedure? A. Seventh step B. Sixth step C. Fifth step D. Second step
B. Sixth step
A cyber architect is writing a memorandum on the mobile security symptoms associated with malware. What should the architect include as part of these symptoms? (Select all that apply.) A. Unexpected application behavior B. Sluggish response time C. High number of ads D. Fake security warnings
B. Sluggish response time C. High number of ads D. Fake security warnings
An employee wants to install an external program/application on their company computer that will support their current project. The employee uses a third-party website and believes that the install location is legitimate. Shortly after installing the software, the employee's computer begins demonstrating symptoms associated with malware. What is the cause of the malware's introduction to the company device? A. Dev mode B. Spoof C. Root access D. APK source
B. Spoof
A software engineer is drafting a memo that focuses on anomalous system behavior regarding system security. What is a symptom of malware introduction to a computer's file system? A. The OS fails to update. B. The file names of saved work changed. C. The device displays unwanted notifications. D. The device presents a series of certificate warnings.
B. The file names of saved work changed.
A cyber consultant reviews the help ticket log and notices several computers submitted for repairs due to being out of sync with other systems. What is the consultant observing in the log? A. Requirement verification B. Time drift C. Windows repair D. System file check
B. Time drift
A cyber engineer creates a training packet on what employees should look for regarding leaked personal and corporate files. What proactive measures should the employees and engineer look for regarding this topic? (Select all that apply.) A. Excessive bandwidth should be monitored. B. Two-step verification should be monitored. C. Websites should be set for immediate notification. D. Linked devices to the data should be quarantined.
B. Two-step verification should be monitored. C. Websites should be set for immediate notification. D. Linked devices to the data should be quarantined.
An employee reports an issue in which they state they cannot print. The help desk technician discovers that the employee uses a peripheral hub with four additional devices connected via a single connector to the computer. What is causing the issue with the printer? A. Time drift B. USB controller resource warning C. No OS found D. Low memory warning
B. USB controller resource warning
A cyber analyst is drafting a memorandum discussing the various messages a user can receive on their device. What type of message appears on the display of a device without the approval or desire from the user? A. Antivirus warnings B. Unwanted notifications C. Certificate warning D. Desktop alerts
B. Unwanted notifications
A software engineer is troubleshooting a team laptop and discovers that several case management tools are out-of-date. What action should the engineer take to get the applications to the latest version? A. Add resources. B. Update the application. C. Reboot. D. Restart service.
B. Update the application.
A technician reviews the best practice procedure that CompTIA created regarding malware removal. What step(s) are associated with remediating infected systems? (Select all that apply.) A. Disable system restore in Windows. B. Use of scanning and removal techniques C. Quarantine infected symptoms. D. Update anti-malware software.
B. Use of scanning and removal techniques D. Update anti-malware software.
A software agent has completed the fifth step of CompTIA's best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process? (Select all that apply.) A. Secure use of software, such as browsers and email clients. B. Verify DNS configuration. C. Re-enable software firewalls. D. Create a fresh restore point or system image.
B. Verify DNS configuration. C. Re-enable software firewalls. D. Create a fresh restore point or system image.
A software engineer troubleshoots an "OS not found" issue on a company computer and wants to repair the boot sector. What recovery mode command prompt can the engineer use to accomplish this troubleshooting task? A. NTUSER.DAT B. bootrec/fixboot C. bootrec/rebuildbcd D. bootrec/fixmbr
B. bootrec/fixboot
A new employee attempts to set up their new computer and activates some desktop alerts to assist in their day-to-day operations. Which is NOT a desktop alert? A. A notification of a newly received email. B. A notification a new message from a colleague at work. C. An advertisement offering items that were recently viewed by the user. D. A notification reminder of an upcoming meeting.
C. An advertisement offering items that were recently viewed by the user.
A cyber technician prepares a briefing on troubleshooting devices with operating system issues. What common issue can impact OS updates, cause the device to reboot randomly, or present a slow response? A. Failure to create a communication link, such as Bluetooth B. Connectivity issues, such as NFC C. Battery issues D. Failure to establish a connection with the Wi-Fi
C. Battery issues
A helpdesk attendant troubleshoots connectivity issues for an employee's mobile device. What type of connectivity issues occurs when two paired devices cannot establish a communication link? A. Wi-Fi B. NFC C. Bluetooth D. AirDrop
C. Bluetooth
cyber architect reviews desktop symptoms and wants to learn more about file system errors and anomalous behaviors. Which are NOT considered symptoms of security issues in the file system? (Select all that apply.) A. Altered personal or system documents B. Missing or renamed files C. Certificate warnings D. Desktop alerts
C. Certificate warnings D. Desktop alerts
A cyber architect removed malware from an employee's computer, successfully quarantined the infected system, and disabled system restore. While following the CompTIA procedure for malware removal, what should the architect do as part of the remediation of infected systems? A. Update anti-malware software. B. Schedule scan and run updates. C. Conduct scanning and removal techniques. D. Quarantine the infected systems.
C. Conduct scanning and removal techniques.
An employee works on their company computer and receives a push notification to download and install software to remain compliant. Upon clicking the link in the notification window, malware inserts into the device. What message did the employee receive? A. Antivirus warning B. Unwanted notifications C. Desktop alert D. Certificate warning
C. Desktop alert
A cyber consultant reviews the company's policy on managing root access security concerns and mobile-device management suites. What makes advanced configuration settings and diagnostic/log data available? A. Spoof B. Root access C. Developer mode D. APK source
C. Developer mode
An employee is working from their desk, and the computer display becomes filled with advertisements. What risk can be associated with a large numbers of ads? A. It can show indicators that data is being leaked. B. It causes the device and programs to operate slower than normal. C. It can be part of an attempt to gain revenue but can pose increased risks to malware and other viruses. D. It persuades users to install infected applications.
C. It can be part of an attempt to gain revenue but can pose increased risks to malware and other viruses.
An employee contacts the help ticket hotline complaining about frequent windows populating on their screen and the distraction it is taking from their work. What risks are associated with random pop-up windows? A. It can cause files to get renamed or removed. B. It can pose unwanted system notifications on the OS. C. It can pose a risk of inadvertently adding malware to the device. D. It can alter system or personal files.
C. It can pose a risk of inadvertently adding malware to the device.
An employee viewed websites to shop for company equipment and traversed to an unknown site. The employee recognizes that the site does not have a little padlock next to the web address and attempts to recall what that means. What is the premise of a certificate warning? A. It is a notification that appears on the display that was not prompted by the user. B. It is a notification that attempts to ruse the user into thinking their device has been infected. C. It is a notification that a website may be untrustworthy and may pose an increased risk. D. It is a notification that requires immediate/urgent attention.
C. It is a notification that a website may be untrustworthy and may pose an increased risk.
An employee visits the cyber help ticket office requesting the technician obtain root privileges, sideload apps, and customize the device's interface. What term is associated with this type of action? A. Dev mode B. Spoof C. Jailbreak D. APK source
C. Jailbreak
An organizational employee is having computing issues while attempting to run several applications simultaneously. What is the employee experiencing in this instance? A. USB controller resource warning B. Time drift C. Low memory warning D. No OS found
C. Low memory warning
A technician conducts a mobile security analysis on a set of work phones and identifies that one of them shows symptoms of malware. What results from malware disrupting connection with legitimate sites causing no traffic to exchange? A. Unexpected application behavior B. Sluggish response time C. No internet connectivity D. Fake security warnings
C. No internet connectivity
A technician is troubleshooting an organizational computer that is continually restarting without any action from the user. What is the computer doing? A. Uninstalling/Reinstalling or updated applications B. Restarting service C. Rebooting D. Adding resources
C. Rebooting
Upon remediating infected systems, the technician is ready to move to the next step of the CompTIA best practice procedure for malware removal. What is the next step in the CompTIA process? A. Quarantine the infected systems. B. Remediate infected systems. C. Schedule scans and updates. D. Disable system restore in Windows.
C. Schedule scans and updates.
A cyber consultant is troubleshooting a mobile device that is having application issues. The technician opens an application and notices that it takes 25 seconds to load. What is the consultant observing? A. Fails to close. B. Fails to launch. C. Slow to respond. D. Fails to update.
C. Slow to respond.
An employee takes their company computer into the help ticket office complaining that the computer is not working correctly. The help ticket staff member identifies that the employee is attempting to run applications with requirements that exceed the company computer's capabilities. What is the employee experiencing when attempting to run these programs? A. Fake security warnings B. High network traffic C. Sluggish response time D. High number of ads
C. Sluggish response time
A technician reviews the CompTIA A+ manual regarding malware symptoms associated with performance issues. What is considered a performance symptom? A. The files of data have been modified by name or are missing. B. The system files have been altered. C. The host cannot access the network or the network is slow. D. Permissions for files have been modified.
C. The host cannot access the network or the network is slow.
An employee goes to several websites to purchase needed office equipment and new laptop computers. The employee selects a website that hosts laptop computers, but the page displays a site with inappropriate content. What has occurred in this situation? A. The user receives a series of notifications that were not prompted by the user. B. The user receives a warning that a site is untrusted. C. The user attempts to open one web page but is directed to another one. D. The user receives a message stating immediate action is required.
C. The user attempts to open one web page but is directed to another one.
A helpdesk technician reviews the CompTIA best practice guide regarding malware removal as they are putting together a presentation for the businesses' cyber department. What is associated with remediating infected systems? A. Educate the end-user. B. Schedule scans and run updates. C. Use of scanning and removal techniques. D. Enable system restore and create a restore point in Windows.
C. Use of scanning and removal techniques.
A helpdesk consultant is reviewing the impacts of malware on mobile and computer assets. What can signify that malware is causing excessive power drain and high resource utilization and cause other apps to perform slowly? A. Fake security warnings B. Unexpected application behavior C. High network traffic D. Data-usage limit notifications
D. Data-usage limit notifications
A help desk consultant removes malware from an employee's computer and follows the CompTIA best practice procedure. The consultant has just completed the second step to quarantine infected systems. What should the consultant do for the next step? A. Update the anti-malware software. B. Schedule scan and run updates. C. Enable system restore and create a restore point in Windows. D. Disable system restore in Windows.
D. Disable system restore in Windows.
A software engineer is preparing a presentation regarding malware discovered on six company computers. Ensuring that the presentation was succinct but informative, the engineer used the best practice procedure for malware removal by CompTIA. What is the final step in CompTIA's procedure? A. Enable system restore and create a restore point in Windows. B. Schedule scans and run updates. C. Update anti-malware software. D. Educate the end-users.
D. Educate the end-users.
A cyber consultant is troubleshooting a mobile device that is having application issues. The consultant identifies an outdated patch, but the consultant cannot get it installed. What is the consultant observing? A. Slow to respond. B. Fails to close. C. Fails to launch. D. Fails to update.
D. Fails to update.
While using the CompTIA best practice for malware removal, a consultant transitions from remediating infected systems to re-enabling system restore points in Windows. What step did the consultant skip? A. Seventh step B. Second step C. Sixth step D. Fifth step
D. Fifth step
A cyber analyst is attempting to remove malware from a company system and is following the steps of the CompTIA best practice procedure for malware removal. What step focuses on updating anti-malware software? A. Seventh step B. Fifth step C. Third step D. Fourth step
D. Fourth step
A technician uses the internet to purchase new computer components and is shopping for the best price. After reviewing several sites, the technician began receiving advertisements for related and unrelated products for the items they were looking for. What is the technician receiving? A. Desktop alerts B. Certificate warnings C. Antivirus warnings D. Frequent pop-ups
D. Frequent pop-ups
A software technician is conducting an after-action report on an issue where someone leaked company information outside of the organization. What data can the technician pull to possibly identify the employee who sent the documentation outside the company? A. Sluggish response B. High number of ads C. Fake security warnings D. High network traffic
D. High network traffic
An employee wants to download and install applications using an android package source. What does this type of sourcing allow? A. It typically masquerades as a legitimate application. B. Makes advanced configuration settings and log data available. C. It allows exploitation to enable customization of the interface. D. It allows applications to be downloaded and installed from untrusted external third-party sources.
D. It allows applications to be downloaded and installed from untrusted external third-party sources.
A software technician is preparing a presentation on the "jailbreaking" of company assets. What does "jailbreaking" allow on a device? A. It makes advanced configuration settings and log data available. B. It can be purposely misused to install bootleg applications. C. It should be used only for application development. D. It enables users to obtain root privileges, sideload applications, and customize interfaces.
D. It enables users to obtain root privileges, sideload applications, and customize interfaces.
A cyber technician is troubleshooting an employee's company mobile device where the employee is complaining that the device is slow to respond. What best describes why the slow response is occurring? A. It occurs when the system does not accept the latest version/patch. B. It occurs when the device does not open an application once the execution command has been initiated. C. It occurs when the application fails to stop after being prompted. D. It occurs when resources are inadequate or the app is badly written.
D. It occurs when resources are inadequate or the app is badly written.
A consultant is troubleshooting an employee's mobile device where the employee is complaining that several of the applications are failing to update. What causes a failure in updates? A. It occurs when the application fails to stop after being prompted. B. It occurs when resources are inadequate or the app is badly written. C. It occurs when the device does not open an application once the execution command has been initiated. D. It occurs when the system does not accept the latest version/patch.
D. It occurs when the system does not accept the latest version/patch.
A cyber specialist troubleshoots a mobile device showing limited internet connectivity to websites. What can cause this decrease in connectivity? A. Malware may be collecting data in the background. B. An actor uses advertisements as a ruse to track a user's activity. C. An actor uses scareware to persuade users to install a nefarious application. D. Malware may be corrupting the domain name system.
D. Malware may be corrupting the domain name system.
A technician attempts to remove malware while following the CompTIA best practices procedure. After investigating malware systems, what is the next step for the technician? A. Update the anti-malware software. B. Schedule scan and run updates. C. Disable system restore in Windows D. Quarantine the infected systems.
D. Quarantine the infected systems.
A cyber technician successfully captures the user profile for a computer that is demonstrating performance issues. The technician moves this profile onto a new computer for the employee's use. What is this called? A. Restore the device. B. Roll back an update. C. Rebuild a Windows profile. D. Reimage the device.
D. Reimage the device.
A tech support assistant is helping an employee with a laptop issue. The reported issue suggests that recently updated applications are not opening. The employee further states they had not shut down and started their machine since updating the applications. What is required before the applications will work on the laptop? A. Reinstall applications. B. Add resources. C. Reboot. D. Restart services.
D. Restart services.
A cyber architect is reviewing a ticketed computer and discovers that the newest driver is corrupted and wants to revert to a good driver. What can the architect do to complete this task? A. Rebuild a Windows profile. B. Reimage the device. C. Restore the device. D. Roll back an update.
D. Roll back an update.
A cyber architect analyzes a computer returned for application and performance issues. As part of their analysis, the architect uses a utility that has a manual interface to review system files and restores stored files if found to be corrupt or damaged. What is the architect using to test files? A. Time drift BWindows repair C. Requirement verification D. SFC
D. SFC
A cyber consultant troubleshoots a computer with anomalous errors and believes the issues originated from malware infection. What is a symptom of security issues associated with malware? A. The operating system is failing to update. B. The device is receiving notifications that are not prompted by the user. C. The device is presenting a warning that it is viewing an untrusted site. D. The device has altered system files.
D. The device has altered system files.
A software engineer is having issues with one of the company laptops and believes it may have malware. What is a symptom that the device may have been affected by malware? A. The devices files have been renamed. B. The device is showing a display to take immediate action. C. The device has altered system files. D. The device is unable to access the network.
D. The device is unable to access the network.
A specialist is developing a training exercise on malware removal and elects to use the CompTIA best practices procedure as the training model. While preparing notes for the training exercise, the specialist discusses quarantining infected systems and immediately transitions to remediating the infected systems. What step did the specialist overlook between these two steps? A. First step B. Fourth step C. Second step D. Third step
D. Third step
A technician is troubleshooting a mobile device where the employee complains that the device will not auto-rotate from vertical to horizontal viewing. From a CompTIA perspective, what is the first step to consider in remedying this situation? A. Consider that some apps can only be used in a single orientation. B. Make sure the battery is charged to perform the requested action. C. Check that the user is not touching any part of the screen as this will prevent rotation. D. Use the notification drawer or Control Center to check that rotation lock is not enabled.
D. Use the notification drawer or Control Center to check that rotation lock is not enabled.
A cyber architect troubleshoots a computer with the message that reflects "OS not found." What recovery mode command prompts repair of the master boot record (MBR)? A. bootrec/rebuildbcd B. bootrec/fixboot C. NTUSER.DAT D. bootrec/fixmbr
D. bootrec/fixmbr