adplus-dvertising
frame-decoration

Question

What is the Native API?

a.

The actual interface to the Windows NT system.

b.

The layer above the Win32 API in Windows NT.

c.

The graphics-related services in Windows NT.

d.

The high-level interface an application employs to communicate with the OS.

Posted under Reverse Engineering

Answer: (a).The actual interface to the Windows NT system. Explanation:The Native API is the actual interface to the Windows NT system. It provides interfaces for direct interfacing with the memory manager, I/O System,etc .

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is the Native API?

Similar Questions

Discover Related MCQs

Q. What prefixes do APIs in the native API start with?

Q. What is the difference between the Nt and Zw versions of native APIs in kernel mode?

Q. Why would you want to go through the system-call mechanism when calling an API from kernel mode?

Q. What is the purpose of the safety mechanism employed by the system when calling an API from user mode?

Q. What is the benefit of calling the Zw APIs in kernel mode?

Q. What is the system calling mechanism?

Q. When does a system call take place?

Q. Why is it not possible to directly call a kernel function from user mode?

Q. What is the dispatch routine in the system calling mechanism?

Q. How did the system call mechanism change after Windows 2000?

Q. What is a system call?

Q. What is the purpose of the system calling mechanism?

Q. What does the EAX register contain during a system call?

Q. What is the IDT?

Q. What happens when an application calls an operating system API?

Q. What is the mechanism used by operating systems for switching from user mode to kernel mode?

Q. Why is it important for reversers to have a basic understanding of executable formats?

Q. What is the executable format used in Windows?

Q. Where can you find a full listing of the individual fields of the Portable Executable (PE) format?

Q. Why is understanding executable formats important for hackers?