REVIEW

A detailed illustration of the Windows boot process, highlighting key components such as kernel mode, user mode, and the boot sequence. Include visual elements like a computer screen showing the boot process and icons representing various system services.

Windows Boot Process Quiz

Test your knowledge on the intricacies of the Windows boot process! This quiz consists of 121 questions covering various aspects of the boot sequence and system components in a Windows environment. Whether you're a beginner or an expert, there's something for everyone.

  • Comprehensive coverage of Windows boot components
  • Engaging questions that challenge your understanding
  • Perfect for students and IT professionals alike!
121 Questions30 MinutesCreated by BootingGnome472
This verifies that all Windows boot components have integrity and can be trusted
A user mode component which is the interface between user mode applications and operating system kernel functions
It helps make sure that a device boots using only the software that is trusted by the Original Equipment Manufacturer (OEM)
It is a layer of code that isolates the kernel, the device drivers, and the rest of the Windows executive from platform-specific hardware differences?
It examines every boot driver and determine whether it is on the list of trusted drivers. If it’s not trusted, Windows won’t load it
Check all the kernel's tasks
Runninc processes
Managing hardware devices
Handling interrupts
Booting the Computer
What Ring is the Closer to the user/Application level(User Mode)?
A kernel mode component which contains the base operating system services, such as memory management, process and thread management, security, I/O, networking, and interprocess communication
It is where the firmware identifies and initializes hardware devices, and then runs a power-on self-test (POST)
It is the first and most important component on the software side of things in the boot procedure on BIOS-based machines.
A special-purpose register which stores a pointer to the address of the instruction that is currently executing. It holds the address of the executing instruction
The user-mode process for the Windows subsystem. Its duties include managing processes and threads, importing many of the DLLs that provide the Windows API, and facilitating shutdown of the GUO during system shutdown
It starts key background processes within Session 0. Starts services.exe, lsass.exe, lsaiso.exe, and creates winlogon.
Initializes the windows desktop manager and deals mostly with graphical user interface. It provides users access to files
Responsible for creating new sessions. It manages the startup of all user sessions in Windows
Responsible for handling the secure attention sequence, loading the user profile, and optionally locking the computer when screensaver is playing
Implements the unified background process manager (UBPM), which is responsible for background activities such as services and scheduled tasks. It also implements the Service Control Manager (SCM), which specifically handles the loading of services and device drivers marked for auto-start.
Serves as a shell for loading services from DLL files and is a generic host process name for services that run from dynamic-link libraries
Is generic method used to load other entities. Upon initialization, it runs a continuous loop listening for trigger events. Example trigger events that can initiate a task include a defined schedule, user logon, system startup, idle CPU time, a Windows log event, workstation lock, or workstation unlock.
Is responsible for most kernel-mode threads. Modules run under it are primarily drivers (.sys files), but also include several important DLLs as well as the kernel executable, ntoskrnl.exe.
Handles terminal services, including Remote Desktop sessions as well as additional local sessions via Fast User Switching. It communicates with smss.exe to start new sessions. It manages connections related to the terminal server on the hosted machine.
Process is responsible for authenticating users by calling an appropriate authentication package specified in HKLM\SYSTEM\CurrentControlSet\Control\Lsa. Typically verifies the validity of the user logon to the computer or the server.
It is a Windows Registry hive that have the configuration Settings for hardware and software and stores control panel settings and user's profile.
What type of windows registry is this? [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
It is a Windows Registry hive that contains all the systemwide configuration subkeys, that is computer specific and not user specific.
It is a Windows Registry hive that contains data regarding the preferences and software configuration of the locally logged – on user.
It is a Windows Registry hive that contains the file system, shortcut information, information on file associations and other user interface information.
Is it a registry API that sets the data and type of a specified value under a registry key.
Which of these are not stored on Windows Registries?
User configurations and settings
User running processes
Desktop settings
Serial Keys and Passwords for some apps
What is the smallest physical storage unit on the disk platter?
It is a method of organization of internal data that is designed for small disks and simple folder structure
It has auto-scanner for checking all files to identify and repair data corruption
Which are the parts of a Hard Disk
Actuator
Spindle
Eraser arm
Platter
It is a concentric circular ring on both sides of each platter.
It was introduced last 2017 to be the operating system by default on all new Macs and new IOS WatchOS and TvOS
Begins from 0 at outer edge and moves towards the center, typically reaching a value of 1023
It is a storage mechanism that reads and writes data to disk.
What is a round flat magnetic metal or ceramic disks in the hard disk that hold the actual data?
What does NTFS (not NSFW) stands for?
A Window utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.
Are graphical objects used to represent commonly used application.
File ___ shrinks the size of a file so it requires less storage space.
The file that is linked with an e-mail and sent to the receiver of the e-mail is referred to as ____
Different applications and documents of windows desktop are represented by
What else is a command interpreter called?
What is the meaning of booting in the operating system?
What is the first program run on a computer when the computer boots up?
By default, driver is loaded in safe mode?
Which of the following memory unit that processor can access more rapidly
Main Memory
Virtual Memory
Cache memory
Read Only Memory
What operating system do you choose to implement a client-server network?
Which mode loads a minimal set of drivers when starting Windows?
Windowing and graphics system implements the:
A system program that sets up an executable program in main memory ready for execution is:
What is the best solution if there are problems after the installation of new software?
Restart the computer
Reinstalling or removing the program
check the compatibility of the software to your OS, and install older version if possible
Check the logs for the errors, and solve the problems
Your computer is overheating and leads to frequent crashes, what is the initial step you must do?
Check the running processes using task manager if they consume much CPU/GPU memory
Close all running applications
replace the cooling system
restart the computer
The computer is continuously beeping. What you should do about it?
install antivirus product
Search online what is that specific beep sound
Restart the computer
Force shutdown the computer
Each time your computer boots up, there's always a message box popping out that is telling you that "Your computer is compromised". How will you solve this problem?
Terminate the program
Restart the computer
Check the autoruns using msconfig.exe / taskmanager.exe and trace the executing file to clean it.
Run your antivirus product and do full scanning
Your computer is infected with a malicious file and must be clean base from its system changes. What is the best sequence to clean your PC?
Kill the PROCESS -> remove the AUTOSTART mechanisms -> delete malicious FILE
Remove the AUTOSTART mechanisms -> kill the PROCESS -> delete malicious FILE
delete malicious FILE -> remove the AUTOSTART mechanisms -> kill the PROCESS
Delete malicious FILE -> -> kill the PROCESS -> remove the AUTOSTART mechanisms
The malicious file running on your system disabled your task manager, registry editor and command prompt. It also installs an autostart mechanism in your registries. How will you be able to clean your PC without executing it?
Install antivirus product
Restart the pc in safe mode
Restart the computer in normal boot
Force shutdown the computer
Base-2 number system that use two symbols, 0 and 1
What does a function compose of?
Parameters
Return Value
Memory
Local Variables
This 16-bit register mainly helps in referencing the parameter variables passed to a subroutine.
This calling convention originates from the C programming language and is used by many C compilers for the x86 architecture and in this, subroutine arguments are passed on the stack.
This assembly initialization specifies memory model; parameter passing conventio
This register usually store the loop count in iterative operations
This 16-bit register stores the offset address of the next instruction to be executed
This register could usually be used in indexed addressing.
This calling convention is used for calling C++ non-static member functions
This assembly initialization contains uninitialized data of your program
The 16-bit register provides the offset value within the program stack
Number system that use two symbols, 0 to 7
Number system that use two symbols, 0 to 9, and A to F representing 10 to 15
Number system that use two symbols, 0 to 9
This is the result of a operation, it can be SUCCESSFUL, FAIL or any value
Give atleast one API for File Searching (example format: CreateFile)
Access rights define what actions can be done on the file
True
False
Choose among the APIs used for Direct File Access
WriteFile()
MapViewOfFile()
CreateFileMapping()
ReadFile()
For functions that return structures, you must first allocate memory for that structure before you can call the function
True
False
Give atleast one Common Directory Changing API (example format: CreateFile)
A file is an object on a computer that stores data, information, settings, or commands used with a computer program. A file could be any of the following:
Consoles
Pipes
Physical Disks and volumes
Directories
ShareMode does not define how other programs can access the file
True
False
These APIs can be used to initiate file operations as both return a file handle to the file
CreateFile
OpenFile
CloseFile
GetFileAttributes
It is a data structure that represents a system resource, such as a file, thread, or graphic image.
Which object category supports graphics?
Which object category supports window management?
Which object category supports memory management, process execution, and interprocess communications?
Program is a container for set of resources used during execution.
True
False
Each process contains:
Process ID
Handles
At least one thread
Virtual Address Descriptor
An entity within a process scheduled by the thread for execution
It allows group of process to be managed and manipulated as a unit
A technique wherein a process that does not terminate and stays in memory until a certain condition is fulfilled.
Give atleast one example of Memory Residency Techniques
Mutex allows multiple program threads to share the same resource, such as file access, but not simultaneously
True
False
Event is used to control access to a common resource by multiple processes
True
False
Give atleast one example of Communication Objects
It is a memory management technique where secondary memory can be used as if it were a part of the main memory
Give atleast one Process and Thread Monitoring Tool
Events from the user' include all of the ways that someone can interact with your program.
True
False
WindowProc Callback Function is an application-defined function that processes messages sent to a window
True
False
Which API is used in process of creating and displaying a Window?
Which of these examples are type of Window?
Button
Text Box
Cursor
Message Box
This API dispatches a windows message to a window procedure D
A window class defines a set of behaviors that several windows might have in common. T
True
False
Events from the operating system' include anything "outside" of the program that can affect how the program behaves.
True
False
DisplayMessage API retrieves a message from the calling thread's message queue.
True
False
This API translates virtual-key messages into character messages
A Message Loop is a loop that checks for messages in the Message Queue.
True
False
Dynamic Linking references are resolved at compile time
True
False
Static Linking references are resolved at load time or run-time
True
False
This API Loads the specified DLL into the address space of the calling process
This API retrieves the address of an exported function or variable from the specified dynamic-link library
Which these files are needed when creating a DLL in masm?
makeit.bat
{dllname}.asm
{dllname}.def
{dllname}.exe
What is the memory model used for 32-bit programming?
A WORD is also equal to:
The return value of a given function is placed on what register?
Which instruction places the address specified by its second operand into the register specified by its first operand?
You used idiv instruction, where will be the quotient result will be stored?
What type of memory can be used to access variables globally and variables can be resized?
How would you call the parameter 1 on the stack using EBP?
How would you call the parameter 2 on the stack using EBP?
What would be the address of the Return Address on the stack, relative to EBP?
{"name":"REVIEW", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on the intricacies of the Windows boot process! This quiz consists of 121 questions covering various aspects of the boot sequence and system components in a Windows environment. Whether you're a beginner or an expert, there's something for everyone.Comprehensive coverage of Windows boot componentsEngaging questions that challenge your understandingPerfect for students and IT professionals alike!","img":"https:/images/course3.png"}
Powered by: Quiz Maker