PrepAway - Latest Free Exam Questions & Answers

Category: 70-660

Exam 70-660: TS: Windows Internals

Of the following tools, which one should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. According to the company requirement, an application is being designed by you. Because of an access violation, the application fails. A heap corruption causes the access violation. Now the company wants you to find out what causes the heap corruption. Of the following tools, which one should be used?

Which of the following tools should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. According to the company requirement, you develop a device driver. This device driver is used on computers that run Windows Server 2008. You have to find out the drivers routines that use more than 50 percent of the computers CPU. Which of the following tools should be used?

So which of the following tools should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. There is a Windows Vista application for you. This application will not run. Now you receive an order from the company CIO. The company wants you to find out all of the dynamic link libraries (DLLs) that the application requires to operate. So which of the following tools should be used?

Which I/O method should be used by your application?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. According to the company requirement, an application is being designed by you. This application will write to a local transactional log. As required by the company, you must make sure that even if a system failure occurs, each write operation is committed to the physical disk in chronological order. Which I/O method should be used by your application?

bff90ca3 8b08 mov ecx,dword ptr [eax] ds:0023:00000000=????????

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. You are in charge of a Windows XP client. This client crashes every week and displays a blue screen. The Stop code below is contained in the blue screen.

**STOP: 0X0000001F (0XC0000005, 0XBFF90CA3, 0X00000000, 0X00000000) KMODE_EXCEPTION_NOT_HANDLED

The !analyze command is run from WinDbg by you and you get the following output.

TRAP_FRAME: bdf80834 — (.trap ffffffffbdf80834)

ErrCode = 00000000

eax=00000000 ebx=bdf80c34 ecx=89031870 edx=88096928 esi=88096928 edi=8905e7f0

eip=bff90ca3 esp=bdf808a8 ebp=bdf80a44 iopl=0 nv up ei ng nz na po nc

cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282

abc+0xfca3:

bff90ca3 8b08 mov ecx,dword ptr [eax] ds:0023:00000000=????????

Resetting default scope

STACK_TEXT:

bdf807c4 80467a15 bdf807e0 00000000 bdf80834 nt!KiDispatchException+0x30e

bdf8082c 804679c6 00000000 bdf80860 804d9f69 nt!CommonDispatchException+0x4d

bdf80838 804d9f69 00000000 00000005 e56c6946 nt!KiUnexpectedInterruptTail+0x207

00000000 00000000 00000000 00000000 00000000 nt!ObpAllocateObject+0xe1

You have to view the call stack which generated the exception. Of the following WinDbg commands, which one should be used?

So what action should you perform?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. According to the company requirement, a new device driver is installed and run by you. But the following error message pops up.

Event ID: 2020

Source: Srv

Description: The server was unable to allocate from the system paged pool because the pool was empty.

You notice that kernel memory pool leaks occur and this may be caused by a device driver.

You discover a kernel memory allocation tag named TAG1 that belongs to the leaked memory. Therefore, you have to find out the device driver and the corresponding call stack that is causing the memory leak. So what action should you perform?

Of the following tolls, which one should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. You are in charge of an application service. Because of heap corruption, it crashes intermittently. When it occurs, you have to detect the heap corruption. Of the following tolls, which one should be used?

So which routine should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. You are writing a user application that runs on Windows Server 2003. According to the company requirement, a user application is being written by you. This application runs on Windows Server 2003. User authentication is need by the design specification for the application. You must make sure that each time the application is started, a local user name and password is entered by users. So which routine should be used?

Which of the following tools should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. For a hardware device, you are developing a Windows device driver. You will install the device driver and hardware device on computers that run Windows Server 2008. Now you have to find out the amount of time that the processor uses to receive and process interrupts. Which of the following tools should be used?

Of the following counters, which one should be monitored?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. You are in charge of a multithreaded application. Now is being tested by you. You have to use Perfmon to test the application for heap leaks. Of the following counters, which one should be monitored?


Page 5 of 6« First...23456