REVIEW
Windows Boot Process Quiz
Test your knowledge on the intricacies of the Windows boot process! This quiz consists of 121 questions covering various aspects of the boot sequence and system components in a Windows environment. Whether you're a beginner or an expert, there's something for everyone.
- Comprehensive coverage of Windows boot components
- Engaging questions that challenge your understanding
- Perfect for students and IT professionals alike!
A user mode component which is the interface between user mode applications and operating system kernel functions
It helps make sure that a device boots using only the software that is trusted by the Original Equipment Manufacturer (OEM)
It is a layer of code that isolates the kernel, the device drivers, and the rest of the Windows executive from platform-specific hardware differences?
It examines every boot driver and determine whether it is on the list of trusted drivers. If it’s not trusted, Windows won’t load it
Check all the kernel's tasks
Runninc processes
Managing hardware devices
Handling interrupts
Booting the Computer
A kernel mode component which contains the base operating system services, such as memory management, process and thread management, security, I/O, networking, and interprocess communication
It is where the firmware identifies and initializes hardware devices, and then runs a power-on self-test (POST)
It is the first and most important component on the software side of things in the boot procedure on BIOS-based machines.
A special-purpose register which stores a pointer to the address of the instruction that is currently executing. It holds the address of the executing instruction
The user-mode process for the Windows subsystem. Its duties include managing processes and threads, importing many of the DLLs that provide the Windows API, and facilitating shutdown of the GUO during system shutdown
It starts key background processes within Session 0. Starts services.exe, lsass.exe, lsaiso.exe, and creates winlogon.
Initializes the windows desktop manager and deals mostly with graphical user interface. It provides users access to files
Responsible for handling the secure attention sequence, loading the user profile, and optionally locking the computer when screensaver is playing
Implements the unified background process manager (UBPM), which is responsible for background activities such as services and scheduled tasks. It also implements the Service Control Manager (SCM), which specifically handles the loading of services and device drivers marked for auto-start.
Serves as a shell for loading services from DLL files and is a generic host process name for services that run from dynamic-link libraries
Is generic method used to load other entities. Upon initialization, it runs a continuous loop listening for trigger events. Example trigger events that can initiate a task include a defined schedule, user logon, system startup, idle CPU time, a Windows log event, workstation lock, or workstation unlock.
Is responsible for most kernel-mode threads. Modules run under it are primarily drivers (.sys files), but also include several important DLLs as well as the kernel executable, ntoskrnl.exe.
Handles terminal services, including Remote Desktop sessions as well as additional local sessions via Fast User Switching. It communicates with smss.exe to start new sessions. It manages connections related to the terminal server on the hosted machine.
Process is responsible for authenticating users by calling an appropriate authentication package specified in HKLM\SYSTEM\CurrentControlSet\Control\Lsa. Typically verifies the validity of the user logon to the computer or the server.
It is a Windows Registry hive that have the configuration Settings for hardware and software and stores control panel settings and user's profile.
What type of windows registry is this? [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
It is a Windows Registry hive that contains all the systemwide configuration subkeys, that is computer specific and not user specific.
It is a Windows Registry hive that contains data regarding the preferences and software configuration of the locally logged – on user.
It is a Windows Registry hive that contains the file system, shortcut information, information on file associations and other user interface information.
Which of these are not stored on Windows Registries?
User configurations and settings
User running processes
Desktop settings
Serial Keys and Passwords for some apps
It is a method of organization of internal data that is designed for small disks and simple folder structure
It was introduced last 2017 to be the operating system by default on all new Macs and new IOS WatchOS and TvOS
A Window utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.
The file that is linked with an e-mail and sent to the receiver of the e-mail is referred to as ____
Which of the following memory unit that processor can access more rapidly
Main Memory
Virtual Memory
Cache memory
Read Only Memory
What is the best solution if there are problems after the installation of new software?
Restart the computer
Reinstalling or removing the program
check the compatibility of the software to your OS, and install older version if possible
Check the logs for the errors, and solve the problems
Your computer is overheating and leads to frequent crashes, what is the initial step you must do?
Check the running processes using task manager if they consume much CPU/GPU memory
Close all running applications
replace the cooling system
restart the computer
The computer is continuously beeping. What you should do about it?
install antivirus product
Search online what is that specific beep sound
Restart the computer
Force shutdown the computer
Each time your computer boots up, there's always a message box popping out that is telling you that "Your computer is compromised". How will you solve this problem?
Terminate the program
Restart the computer
Check the autoruns using msconfig.exe / taskmanager.exe and trace the executing file to clean it.
Run your antivirus product and do full scanning
Your computer is infected with a malicious file and must be clean base from its system changes. What is the best sequence to clean your PC?
Kill the PROCESS -> remove the AUTOSTART mechanisms -> delete malicious FILE
Remove the AUTOSTART mechanisms -> kill the PROCESS -> delete malicious FILE
delete malicious FILE -> remove the AUTOSTART mechanisms -> kill the PROCESS
Delete malicious FILE -> -> kill the PROCESS -> remove the AUTOSTART mechanisms
The malicious file running on your system disabled your task manager, registry editor and command prompt. It also installs an autostart mechanism in your registries. How will you be able to clean your PC without executing it?
Install antivirus product
Restart the pc in safe mode
Restart the computer in normal boot
Force shutdown the computer
This calling convention originates from the C programming language and is used by many C compilers for the x86 architecture and in this, subroutine arguments are passed on the stack.
Access rights define what actions can be done on the file
True
False
Choose among the APIs used for Direct File Access
WriteFile()
MapViewOfFile()
CreateFileMapping()
ReadFile()
For functions that return structures, you must first allocate memory for that structure before you can call the function
True
False
A file is an object on a computer that stores data, information, settings, or commands used with a computer program. A file could be any of the following:
Consoles
Pipes
Physical Disks and volumes
Directories
ShareMode does not define how other programs can access the file
True
False
These APIs can be used to initiate file operations as both return a file handle to the file
CreateFile
OpenFile
CloseFile
GetFileAttributes
Which object category supports memory management, process execution, and interprocess communications?
Program is a container for set of resources used during execution.
True
False
A technique wherein a process that does not terminate and stays in memory until a certain condition is fulfilled.
Mutex allows multiple program threads to share the same resource, such as file access, but not simultaneously
True
False
Event is used to control access to a common resource by multiple processes
True
False
It is a memory management technique where secondary memory can be used as if it were a part of the main memory
Events from the user' include all of the ways that someone can interact with your program.
True
False
WindowProc Callback Function is an application-defined function that processes messages sent to a window
True
False
A window class defines a set of behaviors that several windows might have in common. T
True
False
Events from the operating system' include anything "outside" of the program that can affect how the program behaves.
True
False
DisplayMessage API retrieves a message from the calling thread's message queue.
True
False
A Message Loop is a loop that checks for messages in the Message Queue.
True
False
Dynamic Linking references are resolved at compile time
True
False
Static Linking references are resolved at load time or run-time
True
False
This API retrieves the address of an exported function or variable from the specified dynamic-link library
Which these files are needed when creating a DLL in masm?
makeit.bat
{dllname}.asm
{dllname}.def
{dllname}.exe
{"name":"REVIEW", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on the intricacies of the Windows boot process! This quiz consists of 121 questions covering various aspects of the boot sequence and system components in a Windows environment. Whether you're a beginner or an expert, there's something for everyone.Comprehensive coverage of Windows boot componentsEngaging questions that challenge your understandingPerfect for students and IT professionals alike!","img":"https:/images/course3.png"}