Вы находитесь на странице: 1из 5

Code No: RR411503 Set No.

1
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK ADMINISTRATION
(Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) Write about the hierarchical file system structure of Unix. [10]
(b) What is a link? How many types of links are in Unix? [3]
(c) Write about file access control in Unix. [3]

2. (a) What is dual boot? [2]


(b) What are the choices of file systems when installing different Microsoft oper-
ating systems? [8]
(c) Write short notes on Grub - the boot manager. [4]
(d) What is un-attended installation? [2]

3. (a) Explain the role played by Cfengine is killing old processes. [6]
(b) Explain how the old processes are killed in Unix [6]
(c) How are user resources controlled for“moving users and deleted users”? [4]

4. (a) Describe the central management “Star model” of network administration.[8]


(b) Describe the start model in intermittently connected environment. [8]

5. (a) What are the common assumptions in synchronizing the clock? [8]
(b) What are the advantages in maintaining the configuration with clock synchro-
nization? [8]

6. (a) What are the ways involve to start network daemons? [8]
(b) What role does inetd play for application services. [8]

7. Explain the methodology of“Intrusion Detection and Forensics”. [16]

8. (a) Explain how complex systems are analyzed. [ 8]


(b) How evaluation of hierarchical system is simulated. [4]
(c) Write about various options to perform experimental studies in evaluating
hierarchical system. [4]

⋆⋆⋆⋆⋆

1 of 1
Code No: RR411503 Set No. 2
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK ADMINISTRATION
(Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) Define Network Infrastructure. [6]


(b) Write about the main components of human-computer system. [6]
(c) What are the meta-principles of system administration? Briefly explain about
each.
[4]

2. (a) Define the terms [8]


i. free software
ii. proprietary software
iii. shared libraries
iv. software patches
(b) What are the exceptions involved in configuring security. Explain. [8]

3. (a) What is meant by account policy? [6]


(b) What should an account policy contain? [4]
(c) “Simples is the best”, suggest the maxim for the account policies. [6]

4. (a) Write about popularly used network management technologies. [4]


(b) How does SNMP network management support user management in Win-
dows? [6]
(c) What is a peer-peer application? How SNMP does supports peer-peer network
management. [6]

5. (a) Explain the purpose of randomized topological sorting algorithm during sys-
tem configuration. [8]
(b) Justify the need of variable configuration. [6]
(c) Define Randomization. [2]

6. (a) What are the ways involve to start network daemons? [8]
(b) What role does inetd play for application services. [8]

7. (a) Describe how password security is useful when analyzing network security. [8]
(b) Explain network services during network security. [8]

1 of 2
Code No: RR411503 Set No. 2
8. (a) What are similarities and differences between stochastic and deterministic
behaviors? [8]
(b) Describe the nature of stochastic variables (processes). [4]
(c) What is meant by random errors? Why computers are not immune to random
errors. Give a probabilistic explanation. [4]

⋆⋆⋆⋆⋆

2 of 2
Code No: RR411503 Set No. 3
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK ADMINISTRATION
(Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) What are the common constraints on Mac OS infrastructure [6]


(b) How the restrictions of ”constraints on infrastructure” on the server hosts are
resolved. [6]
(c) Define user behavior. [4]

2. (a) Define the terms [8]


i. free software
ii. proprietary software
iii. shared libraries
iv. software patches
(b) What are the exceptions involved in configuring security. Explain. [8]

3. Explain different issues of user management [16]

4. (a) What role does revision control play in system administration [6]
(b) Explain the importance of MIB to help SNMP function efficiently. [6]
(c) How does software synchronization help in revision control? [4]

5. (a) Write in detail about monitoring tools for configuration management. [8]
(b) What are the advantages of generalized scripting languages in configuration
automation? [8]

6. How do system5init, BSDinit, inetd configuration services work in summoning dae-


mons. [16]

7. (a) Explain the idea behind Virtual Private Network (VPN). [8]
(b) Describe, Analyzing Network Security and its factors [8]

8. (a) Describe the features of delta distribution representing complete certainty. [6]
(b) Explain the significance of “Adding up of independent causes” [6]
(c) Define the principle of Uncertainty. [4]

⋆⋆⋆⋆⋆

1 of 1
Code No: RR411503 Set No. 4
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK ADMINISTRATION
(Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆

1. (a) Compare file system of Windows with Unix. [8]


(b) Compare workstations of Windows with Unix. [8]

2. (a) “Partitioning of disks plays a very important role in configuring and person-
alizing workstations”, Explain. [8]
(b) Describe the maintenance of file system. [8]

3. (a) What are the special considerations required for distributed accounts? [6]
(b) What mechanisms exist for the users to share file in Unix. [6]
(c) What are the limitations of Unix model of file sharing? [4]

4. Explain the mesh model of network administration on logistic networks. [16]

5. (a) Explain the need of configuration automation. [8]


(b) Explain the selection of tools for automation of configuration. [8]

6. Write short notes on [16]

(a) Compiling and installing sendmail


(b) Configuring sendmail
(c) Relaying
(d) Spam and Junk mail

7. (a) What is firewall? How does firewall work? [8]


(b) Compare different types of firewalls. [8]

8. (a) Explain how a dynamic system can be parameterized. [8]


(b) Describe the importance of observational errors of evaluation. [8]

⋆⋆⋆⋆⋆

1 of 1

Вам также может понравиться