Troubleshooting Theory, OSs, and Security Flashcards

1
Q

In Mode, Windows loads only basic drivers, such as a standard VGA video driver and the keyboard and mouse.

A

Safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Holds information about which OSs are installed on the computer.

A

BOOT.INI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Windows 8/7/Vista use ____ in place of the BOOT.INI file, and it is configured with ___.

A

Boot Configuration Data (BCD)

BCDEDIT.EXE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Windows XP, ____ parses the system for hardware information each time Windows is loaded. This information is then used to create dynamic hardware information in the Registry.

A

NTDETECT.COM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On a Windows XP system with a SCSI boot device, this file is used to recognize and load the SCSI interface.

A

NTBOOTDD.SYS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The solution to a corrupted NTOSKRNL.EXE file is to ____

A

boot from a startup disk and replace the file from the setup media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System files come into the picture next. In addition to the previously listed files, all of which (except ____ are located in the root of the C:

A

NTOSKRNL.EXE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Windows 8/7/Vista, ____ replace NTLDR/NTDETECT.COM.

A

WINLOAD.EXE and WINRESUME.EXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

are software components that parse the Registry for configuration information and start needed services and drivers.

A

Executive subsystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ are software components that parse the Registry for configuration information and start needed services and drivers.

A

Executive subsystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ are software programs that tell the operating system how to work with the hardware.

A

Device drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Windows, the ____ feature has the sole purpose of keeping the user from running programs that could pose a potential threat if the user’s privileges were equal to that of Administrator.

A

User Account Control (UAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Over time, systems seem to run slower than they once did. This can be due to a plethora of drivers, lots of background processes, memory hogs, or many other possibilities. The first place to turn for help to troubleshoot this problem is the ____

A

Performance Troubleshooter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ____ will look for common problems, such as more than one virus detection program running, multiple users logged into the same machine, visual settings affecting performance, and so on.

A

Performance Troubleshooter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a file fails to open, it is often due to ____.

A

corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ___ loader file is a key component of the Windows XP boot process and the system will not boot without it.

A

NTLDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the text file ___ is used to identify the operating systems installed, their locations, and the boot options to use.

A

BOOT.INI

18
Q

Windows 8, Windows 7, and Windows Vista use the Windowsfile ___ instead of the NTLDR file and a similar message that this file is missing will appear. To resolve this problem, you can boot into System Recovery Options and choose Startup Repair (or type ___ at the command prompt).

A

Boot Configuration Data (BCD)

BOOTREC /REBUILDBCD

19
Q

If you are using ____ or ___ as a multiboot loader, you can encounter problems if they become corrupted or deleted. To solve these problems, you need to re-create the loader (and reconfigure it for your system) to be able to use it.

A

GRUB (GRand Unified Bootloader)

LILO (LInux LOader)

20
Q

The purpose of this utility is to keep the operating system alive and well. ___ automatically verifies system files after a reboot to see if they were changed to unprotected copies.

A

SFC.EXE

21
Q

Allows you to set the location of an offline boot directory that can then be used for offline repair

A

/OFFBOOTDIR

22
Q

Allows you to set the location of an offline Windows directory that can then be used for offline repair

A

/OFFWINDIR

23
Q

Specifies a file to be scanned and repaired if needed

A

/SCANFILE

24
Q

Checks system files now and repairs any problems found

A

/SCANNOW

25
Q

Specifies a file to be scanned but not repaired if errors are found

A

/VERIFYFILE

26
Q

Specifies that files are scanned but not repaired if errors are found

A

/VERIFYONLY

27
Q

The utility ___ does a job similar to BOOTREC /REBUILDBCD, and it is a bit easier to work with.

A

BOOTCFG

28
Q

____, known as the ___ tool, allows you to register and unregister modules and controls for troubleshooting purposes.

A

REGSVR32.EXE

REGSVR32

29
Q

Disables automatic restarting and is helpful when troubleshooting.

A

Disable Automatic Restart On System Failure

30
Q

Sends information through the serial port for interpretation/troubleshooting at another computer.

A

Debugging Mode

31
Q

Both ____ and ___ are pages or sites that you did not specifically request and may only display ads or bring up applets that should be avoided.

A

pop-ups & pop-unders

32
Q

____ is a form of redirection in which traffic intended for one host is sent to another.

A

Pharming

33
Q

___ is defined as any unwanted, unsolicited email, and not only can the sheer volume of it be irritating, it can often open the door to larger problems.

A

Spam

34
Q

Recently, the word spam has found its way into other forms of unwanted messaging beyond email, giving birth to the acronyms ____ and ____.

A

SPIM (SPam over Instant Messaging)

SPIT (SPam over Internet Telephony)

35
Q

The process of running an antivirus program on a computer is known as ___ the computer against a virus.

A

inoculating

36
Q

There are two categories of viruses: ___ & ___.

A

benign and malicious

37
Q

___ viruses don’t do much besides replicate themselves and exist.

A

Benign

38
Q

___ viruses, on the other hand, are designed to destroy things.

A

Malicious

39
Q

___ was added to Windows, and it allows you to create restore points to make recovery of the operating system easier.

A

System Restore

40
Q

To open System Restore, click Start ➢ ___ – ___ – ___ – ___. By clicking Next, you can choose a restore point.

A

All Programs ➢ Accessories ➢ System Tools ➢ System Restore

41
Q

What are the seven steps for Malware removal?

A
  1. Identify malware symptoms.
  2. Quarantine infected system.
  3. Disable System Restore (in Windows).
  4. Remediate infected systems.
  5. Schedule scans and run updates.
  6. Enable System Restore and create a restore point (in Windows).
  7. Educate the end user.
42
Q

____ analyzer gives a complete graphical representation of traffic and signals and is useful in detecting security related issues.

A

Cell tower