PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which synchronization primitive should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. According to the company requirement, a user mode application is being developed by you. Two processes are contained in this application. The two processes need to be allowed to synchronize access to a shared data area. Which synchronization primitive should be used?

What should be purchased to achieve the goals above?

You are responsible for the company network and provide technical support for your company. You are in charge of offering service for a customer named Alex. According to a volume license agreement, Microsoft Office Project 2003 has been purchased by Alex without Microsoft Software Assurance. Then Alex has performed an installation of 300 copies of Project 2007. Now you get an order from the CIO, you are asked to make sure that Alex conforms to software licensing. In addition, when you achieve this goal, you should use as little costs as possible.What should be purchased to achieve the goals above?

Of the following tolls, which one should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. You are in charge of an application service. Because of heap corruption, it crashes intermittently. When it occurs, you have to detect the heap corruption. Of the following tolls, which one should be used?

What action should you perform to accomplish your task?

You are responsible for the company network and provide technical support for your company. You are in charge of offering service for a customer named Alex. For this customer, a software asset lifecycle is managed by you. In the company of this customer, there is centralized purchasing. Alex notices that some employees use their personal credit cards to purchase software. Therefore, he asks you to control employee software purchases. What action should you perform to accomplish your task?

Which IRQ Level (IRQL) should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. For Windows XP, a device driver is created by you. This device driver runs on uniprocessor systems only. A system thread and a deferred procedure call (DPC) are created by the driver. The DPC is invoked by a repeating timer. Both the thread and the DPC must process entries from the same work queue. You must make sure that the system thread and the DPC are synchronized. Which IRQ Level (IRQL) should be used?

So of the following data fields, which one should be identified?

You are responsible for the company network and provide technical support for your company. You are in charge of offering service for a customer named Alex. In Alex’ company, there are multiple offices. In each office, a different software reseller is used to purchase software licenses. Besides, there is a report maintained in each office, which records its software purchases in detail. In that report, you can see the information of product version and product edition as well as product family name. Now you get an order from the customer, according to his requirements, the data field which can consolidate the information into a complete software entitlements report should be identified. So of the following data fields, which one should be identified?

Of the following WinDbg commands, which one should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. There is a colleague named Jason in the company. He has a computer which is named C01. Windows Server 2003 x64 Edition is run by C01. Now the computer crashes. After he opens the crash dump file, he finds that an illegal instruction exception has been caused by a kernel-mode device driver. Since you are the technical support, he asks you to find out whether the device driver is corrupt. Of the following WinDbg commands, which one should be used?

So what action should you perform to accomplish your task?

You are responsible for the company network and provide technical support for your company. You are in charge of offering service for a customer named Alex. All hardware inventories for Alex are contained in your report. The upgrade licenses to install Microsoft Office have been purchased by Alex. The latest version of Office is run by all computers. Since you provide technical support, you are asked to make sure that all upgrade licenses comply with the latest version of Office. So what action should you perform to accomplish your task?

Of the following WinDbg commands, which one should be used?

You are the IT professional who work in an International company named Wiikigo. You are experienced in troubleshooting operating systems and applications that are not working correctly, identifying code defects and so on. You have enough knowledge on windows internals and you provide technical support for the company. There is a computer named C02 in the company.

Windows Server 2008 is run by this computer. You find that most of the CPU time is used by the LSASS process. On the computer, a complete memory dump file is generated by you. You have to view the kernel-mode and user-mode stacks of all threads in the LSASS process. Of the following WinDbg commands, which one should be used?

So of the following tools, which one should be chosen to achieve that goal?

You are responsible for the company network and provide technical support for your company. You are in charge of offering service for a customer named Alex. In his company, there are multiple offices, which have decentralized purchasing. In Microsoft Office Excel spreadsheets, software and hardware inventories for each office have been maintained. Now you get an order from the CIO, according to his requirements, you should choose the tool that collects software usage information. So of the following tools, which one should be chosen to achieve that goal?