Microsoft Windows Quiz

Microsoft Windows Quiz For Intermediate




1) You can open a Port in Windows Firewall by selecting allow a program through Windows Firewall

  1. False
  2. True
  3. May be true
  4. a May be false

Answer : B

 
 
2) The registry key that holds the database of installed services in a system is ___________

  1. HKEY_CURRENT_USER\ControlPanel\Services
  2. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
  3. HKEY_CURRENT_CONFIG\SYSTEM\CurrentControlSet\Services
  4. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Services

Answer : B

 
 
3) Your computer name is “Computer1”. How do view all the shares created on your folder

  1. Start->Run->\\Compter1
  2. Start->Run-> view \\Compter1
  3. Start->Run-> Get \\Compter1
  4. Start->Run->Netview\\Compter1

Answer : A

 
 
4) What does RAID stands for

  1. Redundant Array of Integrated Disks
  2. Redundant Array of Inexpensive Disks
  3. Redundant Array of Independent Disks
  4. Redundant Array of Improved Disks

Answer : C

 
 
5) ____________Display or set a search path for executable files in Windows Operating System

  1. SearchPath
  2. Path
  3. GetPath
  4. GetPath

Answer : B

 
 
6) To view or edit 64-bit keys, you must use the 64-bit version of Registry Editor which is __________

  1. exe
  2. exe
  3. exe
  4. Regedit.exe

Answer : D

 
 
7) What does MSTSC stand for

  1. Microsoft Technical Services Client
  2. Microsoft Terminal Services Client
  3. Microsoft Tuning Services Client
  4. None of the above

Answer : B

 
 
8) Which of the following file systems allows to compress drive to save disk space?

  1. NTFS
  2. FAT32
  3. FAT16
  4. All of the above

Answer : A

 
 
9) ________ allows you  to access a computer running Windows from another computer running Windows

  1. Remote Server program
  2. Remote Server Extension
  3. Remote Desktop Program
  4. Remote Desktop Extension

Answer : C

 
 
10) __________ is a network protocol used on the Internet or local area networks to provide a bidirectional interactive communications facility.

  1. NetBIOS
  2. TCP/IP
  3. Telnet
  4. NamedPipes

Answer : C




 
11) _____________ is a program used in Windows to query Domain Name System (DNS) servers to find DNS details.

  1. dnssearch
  2. nssearch
  3. dnslookup
  4. nslookup

Answer : D

 
 
12) ______________ is the loopback address used to verify that TCP/IP is installed and configured correctly on the local computer.

  1. 127.0.0.1
  2. 0.0.1
  3. 0.0.1
  4. 0.0.1

Answer : A

 
 
13) ________Commnd is used Test a network connection in Windows Operating System

  1. IPConf
  2. NetConf
  3. PING
  4. All of the Above

Answer : C

 
 
14) 1. Which of the following storage components are part of file systems supported by Windows?

  1. Volumes. A volume is a collection of directories and files.
  2. Directories. A directory is a hierarchical collection of directories and files.
  3. Files. A fi
  4. a. All of A, B, C are supported
  5. Only A and C is supported
  6. Only C is supported
  7. Only B and C are supported

Answer : A

 
 
15) 10. A process has which of the following

  1. Virtual Address Space
  2. Unique Identifier
  3. Primary Thread
  4. All of the above

Answer : D

 
 
16) 11. Which option below correctly describes Windows scheduling?

  1. It schedules based on first come first serve with priority pre-emption by higher priority ready thread
  2. It schedules the shortest job first. Assuming no interference due to processor affinity it can preempt the current job by a higher priority runnable /ready thread
  3. It schedules based on priority and is preemptive. Assuming no interference due to processor affinity the highest priority runnable /ready thread always executes.
  4. It is priority-driven, non-preemptive but depending on processor affinity

Answer : C

 
 
17) 12. If process P1 has 7 runnable threads and process P2 has 5 runnable threads, and all 12 threads are at the same priority, how much CPU time would each thread get and why?

  1. Would be decided at the time of thread creation as the CPU time and number is decided when CreateThread is invoked
  2. Each process would get 50 percent of the CPU and the processes would decide how much to give each thread within the process.
  3. P1 would get 1/7th of CPU time and P2 would get 1/5th. Internally the processes P1 and P2 would decide how much to give each thread based on how heavy they are.
  4. Each thread would receive one-twelfth of the CPU time as they are of same priority

Answer : D

 
 
18) 13. Which of the following is TRUE about thread pooling in Windows

  1. It enables you to use threads more efficiently by providing your application with a pool of worker threads that are managed by the system.
  2. At least one thread monitors the status of all wait operations queued to the thread pool
  3. When a wait operation has completed, a worker thread from the thread pool executes the corresponding callback function
  4. All of the above

Answer : D

 
 
19) 14. Windows provides memory protection to prevent user processes from corrupting the address space of another process or the operating system itself. Which of the following methods are used by Windows to achieve this protection?

  1. A) All system-wide data
  2. Only A
  3. Only B
  4. Neither A nor B
  5. Both A and B

Answer : D




 
20) 15. The size of a pointer to an integer in a 32 bit Windows OS will be _____ long

  1. 4 bytes
  2. 1 bytes
  3. 4 bits
  4. 8 bits

Answer : A

 
 
21) 2. Which statement holds TRUE for the File compression and decompression supported by NTFS

  1. It uses a lossless algorithm and is carried out transparently
  2. It supports any size file to be compressed
  3. It uses a lossy algorithm causing some data to be lost
  4. It gives access to compressed bytes of the file and allows an application to work directly on them to make changes to the file

Answer : A

 
 
22) 3. Which of the following is a valid file link in Windows NTFS?

  1. a) Hard link
  2. b) Junction
  3. c) Symbolic link
  4. d) All of the above

Answer : D

 
 
23) 4. CreateFile API can be used for which of the following Operations

  1. Creating a File
  2. Opening a File for Reading
  3. Opening a File for Writing
  4. All of the above

Answer : D

 
 
24) 5. Which is the API function used to copy an existing file to a new location and delete the original

  1. CopyFile
  2. MoveFile
  3. ReplaceFile
  4. CreateFile

Answer : B

 
 
25) 6. Which of the following is not correct w.r.t. file systems in Windows

  1. Windows supports FAT file system primarily to enable upgrades from other versions of Microsoft Windows
  2. NTFS file system is the native file system format of Windows
  3. FAT uses 64bit cluster numbers
  4. NTFS logs changes to metadata in a transactional so that file system structures can be repaired to a consistent state

Answer : C

 
 
26) 7. When an open file is no longer in use, the application should close it using which of the following functions?

  1. DeleteFile
  2. CloseHandle
  3. CloseModule
  4. CloseFile

Answer : B

 
 
27) 8. A file in which much of the data is zeros is called a ___________

  1. Binary File
  2. System File
  3. Sparse File
  4. Log File

Answer : C

 
 
28) 9. In a 64 bit system which is the component that supports the coexistence of 32-bit and 64-bit COM registration and application states by presenting 32-bit applications with an alternate view of the registry?

  1. Registry Emulator
  2. Regedt64
  3. Registry Monitor
  4. WOW64 Emulator

Answer : D

 
 
29) How do you take backup of Windows Registry

  1. You can’t take registry backup seperatly
  2. In the Registry Editor select the node to backup and from the File menu select “Export” option
  3. In the Registry Editor select the node to backup and from the File menu select “Backup” option
  4. In the Registry Editor select the node to backup and from the Tools menu select “Backup” option

Answer : B




 
30) In PowerShell, tasks are generally performed by

  1. Commands
  2. .net code
  3. Cmdlets
  4. All of the above

Answer : C

 
 
31) ipconfig (internet protocol configuration) in Microsoft Windows is a console application that lets you

  1. Display all current TCP/IP network configuration values
  2. Release the IP address for the specified adapter
  3. Renew the IP address for the specified adapter
  4. All of the above

Answer : D

 
 
32) LoginMode key value ‘1’ under HKEY_LOCAL_MACHINE subtree denotes which athentication mode of SQL Server?

  1. Windows athentication
  2. SQL Server authentication
  3. Both SQL & Windows Authentication
  4. None of the above

Answer : A

 
 
33) Network architecture in Windows is based on the seven layered ___________reference model

  1. OSI (Open Systems Interconnection)
  2. WSI (Windows Systems Interconnection)
  3. WOSI(Windows Open Systems Interconnection)
  4. SI (Systems Interconnection)

Answer : A

 
 
34) Terminating a Process has which of the following results?

  1. The process code is removed from memory
  2. The process exit code is set
  3. The process object is signaled
  4. All of the above

Answer : D

 
 
35) What are two methods for calling a function in a DLL

  1. Load-time dynamic linking and Run-time dynamic linking
  2. Load-time static linking and Run-time dynamic linking
  3. Static linking and Dynamic linking
  4. None of the above

Answer : A

 
 
36) What is the command you use to invoke Event Log from command prompt

  1. Open EvenLog
  2. Open Eventvwr
  3. Eventvwr
  4. EventLog

Answer : C

 
 
37) What is true about load-time dynamic linking

  1. A module makes explicit calls to exported DLL functions as if they were local functions
  2. You need to link the module with the import library for the DLL that contains the functions
  3. The import library supplies the system with the information needed to load the DLL and locate the exported DLL functions when the application is loaded
  4. All of the above

Answer : D

 
 
38) What is Windows PowerShell?

  1. Windows GUI shell designed especially designed for .net developers
  2. Windows command-line shell designed especially for system administrators
  3. Windows command Prompt designed especially for system administrators
  4. None of the above

Answer : B

 
 
39) Which is the Console registry tool to edit the registry that can be invoked from the command prompt?

  1. exe
  2. exe
  3. Reg.exe
  4. exe

Answer : C




 
40) Which of the below are Protocols supported by Windows

  1. Windows Sockets 2
  2. NetBIOS
  3. Teredo
  4. All of the above

Answer : D

 
 
41) Which of the following cannot be encrypted?

  1. Compressed files
  2. System files and directories
  3. Root directories
  4. All of the above

Answer : D

 
 
42) Which of the following is not true about Dynamic Linked Libraries

  1. Provide a way to modularize applications so that their functionality can be updated and reused more easily
  2. Help to reduce memory overhead when several applications use the same functionality
  3. Supports only exported functions
  4. Programs written in different programming languages can call the same DLL function as long as the programs follow the same calling convention that the function uses.

Answer : C

 
 
43) Which of the following is not true about Windows Registry

  1. Windows operating system and other programs use the registry to store data about users and about the current configuration of the system and its components.
  2. Windows operating system and other programs use the registry to store data about users but not about the current configuration of the system and its components.
  3. Windows registry is a hierarchical database that stores the values of variables in Windows and the applications and services that run on Windows
  4. Windows registry is available whenever the system is running

Answer : B

 
 
44) Which of the following is true about Windows services

  1. Services require no user intervention to run
  2. Services takes less system resources
  3. Services state can’t be managed
  4. Services must be started during system startup

Answer : A

 
 
45) Which of the following statements is FALSE about eventlogs?

  1. Application and Services should add their names to the Application Log
  2. Eventlog supports Custom Log which contains customised events to be logged by applications
  3. Device Drivers should record their events to the Security log
  4. An event source is the name of the software that logs the event

Answer : C

 
 
46) Which of the following steps are performed by the Service Control Manager when the service starts on demand?

  1. Load the user profile
  2. Creates the service in the suspended state
  3. Allows the service process to execute
  4. All of the above

Answer : D

 
 
47) Which Registry Key contains Edition of the SQL Server installed on that system

  1. HKEY_CLASSES_ROOT
  2. HKEY_CURRENT_CONFIG
  3. HKEY_LOCAL_MACHINE
  4. HKEY_INSTALL_CONFIG

Answer : C

 
 
48) Windows Event viewers ‘Windows Event Logs’ section consists of

  1. Application & Security Logs
  2. Setup & System Logs
  3. Forwarded Event Logs
  4. All of the above

Answer : D

 
 
49) Windows registry consists of nested containers. Choose the correct container(s) from the list given below

  1. a) Subtrees b) Keys c) Subkeys d) Hives
  2. Only A
  3. A and B
  4. A, B and C
  5. All of the above

Answer : C

 
 
50) You can quickly install your service application by using a command-line utility called  __________________

  1. exe
  2. InstallUtil.exe
  3. exe
  4. exe

Answer : B