PrepAway - Latest Free Exam Questions & Answers

Category: 70-660

Exam 70-660: TS: Windows Internals

Which synchronization primitive should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. According to the company requirement, a user mode application is being developed by you. Two processes are contained in this application. The two processes need to be allowed to synchronize access to a shared data area. Which synchronization primitive should be used?

So what action should you perform to make sure of this?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. According to the company requirement, a custom application is developed by you. At the time that User Account Control (UAC) is enabled, the application fails to run under Windows Vista. You must make sure that at the time that your application is run on Windows Vista computers, it gets elevated privileges. So what action should you perform to make sure of this?

Which routine should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. For a hardware device, a Windows device driver is developed by you. A simple direct memory access (DMA) controller is used by the hardware device which does not perform virtual address translation. A 64-KB buffer needs to be allocated in Windows. A DMA transfer of 64 KB from the hardware device is accepted by the buffer. Which routine should be used?

Which command should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. For a PCI device, a device driver is created by you. The PCI device runs on Windows Server 2003 computers. The device drivers interrupt processing is tested by you. The computer stops responding. You have to use WinDbg to locate the list of interrupt handling routines in the crash dump. Which command should be used?

So which of the following tools should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. There is a colleague named Jason in the company. He has a computer which is named C01. Windows Server 2003 is run by C01. He has to find out the maximum size available for the paged pool on the computer. But he is not clear about which tool he should use. Since you are the technical support, he asks for your answer. So which of the following tools should be used?

Of the following WinDbg commands, which one should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. From Application Verifier (AppVerifier), you get a bug report. According to the indication of this report, when an application quits, handle leaks happen. You have to find out the call stack that is causing the handle leak. Of the following WinDbg commands, which one should be used?

Of the following WinDbg commands, which one should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. There is a computer named C02 in the company.

Windows Server 2008 is run by this computer. You find that most of the CPU time is used by the LSASS process. On the computer, a complete memory dump file is generated by you. You have to view the kernel-mode and user-mode stacks of all threads in the LSASS process. Of the following WinDbg commands, which one should be used?

Of the following WinDbg commands, which one should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. There is a computer named C02 in the company.

Windows Server 2008 is run by C02. The computer crashes every week and a complete memory dump is created. The !analyze command is run from WinDbg by you and get the following output:

Bad_Pool_Header 0x0000000019 (0x0000000020, 0xa34583b8, 0xa34584f0, 0x0a270001)

You need to identify the pool tag that is associated with the Bad_Pool_Header pool allocation. Of the following WinDbg commands, which one should be used?

So what action should you perform?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. You are in charge of an application named MyApp. This application fails sometimes and displays the following exception code: 0xC0000005 According to the indication of the call stack, MyApp fails in different locations including ntdll.dll and MyApp.exe. The functions main and doRealWork are always included in the stack trace always. You review the source code for MyApp.exe and find the following code snippet:

#include <string.h>

#include <stdio.h>

extern void doRealWork(char *);

char * myfunc(char *);

void main(int argc,char *argv[])

{

char * szLocalBuffer;

szLocalBuffer = myfunc(“Data Pay load”);

if (!szLocalBuffer)

{

printf(“a failure has occured\r\n”);

}

else

{

doRealWork(szLocalBuffer);

}

}

char * myfunc(char *szData)

{

char *szBuffer;

szBuffer=(char*)malloc(10);

if(szBuffer)

{

sprintf(szBuffer,”The data passed to this function was %s”,szData);

return szBuffer;

}

else

{

return NULL;

}

}

In the above code, you resolve the error. You find that MyApp.exe continues to fail with the same call stacks. You have to find out what is causing the application to fail. So what action should you perform?

What action should you perform?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. There is a colleague named Jason in the company. He has a computer which runs Windows Vista. The computer has the kernel debugging option enabled. A partial checked build of the kernel (ntoskrnl.chk) and the HAL (halacpi.chk) need to be loaded from

the debug target. But he is not clear about what to do. Since you are the technical support, he asks for your help. What action should you perform?


Page 3 of 612345...Last »