Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "310-151" Exam

Required Dump

 required dump 
latest dump required 
plz ad it 
thanks


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-660 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-660" Exam

TS: Windows Internals

 Question 1.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network has a Windows Server 2008 application server named ABC-SR01. ABC.com has entered into partnership with Weyland Industries. Weyland Industries has recently developed an application for their network users, which will be run from ABC-SR01. During the course of the day you receive complaints from the Weyland Industries network users that the application as result of heap corruption. After a brief analysis, you instruct the Weyland Industries network users to enable the full page heap dump when creating a user dump file for troubleshooting. You would like to verify whether the Weyland Industries network users had indeed enabled the full page heap dump when they created the user dump.

Which of the following actions should you take?

A. You should consider making use of the WinDbg !Locks command.
B. You should consider making use of the WinDbg !runaway command.
C. You should consider making use of the WinDbg !gflag command.
D. You should consider making use of the Debub: D (dump file) command.

Answer: C

Explanation:

Question 2.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network has a Windows Server 2008 application server named ABC-SR01. ABC.com has recently developed an application that uses a service for their network users which will be run from ABC-SR01. While performing daily system maintenance on ABC-SR01 you notice that the CPU is operating at maximum capacity. You have been tasked with determining which service results in the CPU utilization being heavy by performing a process dump of the service.

Which of the following actions should you take?

A. You should consider making use of the System Monitor utility after running the dump.
B. You should consider making use of the Adplus.vbs utility after running the dump.
C. You should consider making use of a Process Viewer utility after running the dump.
D. You should consider making use of the Task Manager utility after running the dump.

Answer: B

Explanation:

Question 3.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application that makes use of an I/O dispatch routine, which supports buffered I/O. The CIO from ABC.com has asked you to modify the application to make use of a 5-KB I/O request packet (IRP). The CIO from Weyland Industries has also asked you to obtain the kernel address of the 5-KB buffer.

Which of the following statements are true with regard to the kernel address of the 5-KB buffer?

A. The Irp->Overlay.Driver[1] field of the IRP would contain the kernel address of the 5-KB buffer.
B. The Irp->UserBufferContext field of the IRP would contain the kernel address of the 5-KB 
    buffer.
C. The Irp->AssociatedIrp.SystemBuffer field of the IRP would contain the kernel address of the 
    5-KB buffer.
D. The Irp->Overlay.Context field of the IRP would contain the kernel address of the 5-KB buffer.

Answer: C

Explanation:

Question 4.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed a multithreaded application for their network users, which will be run from ABC-SR01. A current ABC.com written security policy states that all applications should be tested for heap leaks. You have been given the task of enforcing this policy.

Which of the following actions should you take?

A. You should consider making use of the Process\Handle Count counter of Performance  
    Monitor.
B. You should consider making use of the Process %Privilege Time counter of Performance  
    Monitor.
C. You should consider making use of the Process\Private Byte counter of Performance Monitor.
D. You should consider making use of the Process %Elapsed Time counter of Performance  
    Monitor.

Answer: C

Explanation:

Question 5.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed a driver for newly developed hardware. A current ABC.com written security policy states that verification on the process interrupts and processor time is used by new drivers. You have been instructed to enforce this security policy.

Which of the following actions should you take?

A. You should consider making use of the Windows Event Viewer utility.
B. You should consider making use of the Performance Monitor utility.
C. You should consider making use of the System MonitorTaskmgr.exe utility.
D. You should consider making use of a Process Viewer utility.

Answer: B

Explanation:

Question 6.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application for their network users, which will be run from ABC-SR01. A new ABC.com written security policy states that all network users should be required to use Active Directory user accounts with passwords when accessing applications hosted on ABC-SR01. The CIO has instructed you to make sure that the new security policy is enforced. 

Which of the following actions should you take?

A. You should consider making use of the CredUIPromptForCredentials() routine to ensure the  
    network users use Active Directory user accounts and credentials.
B. You should consider making use of the CredUILogonProcess() routine to ensure the network  
    users use Active Directory user accounts and credentials.
C. You should consider making use of the CredWriteLocalCredentials() routine to ensure the  
    network users use Active Directory user accounts and credentials.
D. You should consider making use of the CredWriteDomainUserName() routine to ensure the  
    network users use Active Directory user accounts and credentials.

Answer: A

Explanation:

Question 7.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network run Microsoft Windows Server 2008 and all client computers run Microsoft Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR01. ABC.com has developed an audio driver for an application that will be run from ABC-SR01. You receive instruction from ABC.com to make sure that the new audio driver is checked for memory used after it has been released. It must also be checked for Memory underruns and overruns.

Which of the following actions should you take?

A. You should consider making use of Windows File Protection to check the driver.
B. You should consider using the Special pool option of the Driver Verifier tool.
C. You should consider making using of the System File Checker (SFC) tool.
D. You should consider making use of the File Signature Verification tool.

Answer: B

Explanation:

Question 8.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all workstations run either Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application, which is programmed to write to a local transaction log. You have been instructed to make sure that the application is able to have write operations committed to the hard disk in sequential order, in the event of a server operating system failure.

Which of the following actions should you take?

A. You should consider having the application configured with its own memory space using the  
    Memory mapped I/O method.
B. You should consider making use of the Asynchronous I/O method for the application.
C. You should consider making use of the Write-through I/O method for the application.
D. You should consider making use of the Synchronous I/O method for the application.

Answer: C

Explanation:

Question 9.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all workstations run either Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application, which will be run from ABC-SR01. During the course of the day, you receive complaints from network users stating that the application fails as a result of a missing Dynamic Link Library (DLL). The CIO has requested that you determine which DLL file is missing from the application.

Which of the following actions should you take?

A. You should consider making use of the Depends.exe utility.
B. You should consider making use of the Windows Task Manager utility.
C. You should consider making use of a Process Viewer utility.
D. You should consider making use of auditing to audit the files that the application calls.

Answer: A

Explanation:

Question 10.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all workstations run either Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR66. ABC.com has recently developed a device driver for newly acquired hardware. A new ABC.com written security policy states that all driver routines that utilize half the CPU should be identified. You have been instructed by the CIO to make sure that the new policy is adhered to.

Which of the following actions should you take?

A. You should consider making use of the Performance Monitor utility.
B. You should consider making use of the Kernrate.exe utility.
C. You should consider making use of the Task Manager utility.
D. You should consider making use of a Process Viewer utility.

Answer: B

Explanation:

Question 11.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has entered into partnership with Weyland Industries. Weyland Industries recently developed an application for their network users, which will be run from ABC-SR01. You have received reports from the Weyland Industries network users that the application fails and generates an error message stating “the application failed due to an access violation caused by heap corruption”. You have been tasked with determining the reason for the heap corruption.

Which of the following actions should you take?

A. You should consider making use of the Performance.msc snap-in.
B. You should consider making use of the Network Monitor 3.0 utility.
C. You should consider making use of the Application Verifier utility.
D. You should consider making use of the System Monitor utility.

Answer: C

Explanation:



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.