Академический Документы
Профессиональный Документы
Культура Документы
1
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK ADMINISTRATION
(Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
1. (a) Write about the hierarchical file system structure of Unix. [10]
(b) What is a link? How many types of links are in Unix? [3]
(c) Write about file access control in Unix. [3]
3. (a) Explain the role played by Cfengine is killing old processes. [6]
(b) Explain how the old processes are killed in Unix [6]
(c) How are user resources controlled for“moving users and deleted users”? [4]
5. (a) What are the common assumptions in synchronizing the clock? [8]
(b) What are the advantages in maintaining the configuration with clock synchro-
nization? [8]
6. (a) What are the ways involve to start network daemons? [8]
(b) What role does inetd play for application services. [8]
⋆⋆⋆⋆⋆
1 of 1
Code No: RR411503 Set No. 2
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK ADMINISTRATION
(Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
5. (a) Explain the purpose of randomized topological sorting algorithm during sys-
tem configuration. [8]
(b) Justify the need of variable configuration. [6]
(c) Define Randomization. [2]
6. (a) What are the ways involve to start network daemons? [8]
(b) What role does inetd play for application services. [8]
7. (a) Describe how password security is useful when analyzing network security. [8]
(b) Explain network services during network security. [8]
1 of 2
Code No: RR411503 Set No. 2
8. (a) What are similarities and differences between stochastic and deterministic
behaviors? [8]
(b) Describe the nature of stochastic variables (processes). [4]
(c) What is meant by random errors? Why computers are not immune to random
errors. Give a probabilistic explanation. [4]
⋆⋆⋆⋆⋆
2 of 2
Code No: RR411503 Set No. 3
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK ADMINISTRATION
(Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
4. (a) What role does revision control play in system administration [6]
(b) Explain the importance of MIB to help SNMP function efficiently. [6]
(c) How does software synchronization help in revision control? [4]
5. (a) Write in detail about monitoring tools for configuration management. [8]
(b) What are the advantages of generalized scripting languages in configuration
automation? [8]
7. (a) Explain the idea behind Virtual Private Network (VPN). [8]
(b) Describe, Analyzing Network Security and its factors [8]
8. (a) Describe the features of delta distribution representing complete certainty. [6]
(b) Explain the significance of “Adding up of independent causes” [6]
(c) Define the principle of Uncertainty. [4]
⋆⋆⋆⋆⋆
1 of 1
Code No: RR411503 Set No. 4
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK ADMINISTRATION
(Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
2. (a) “Partitioning of disks plays a very important role in configuring and person-
alizing workstations”, Explain. [8]
(b) Describe the maintenance of file system. [8]
3. (a) What are the special considerations required for distributed accounts? [6]
(b) What mechanisms exist for the users to share file in Unix. [6]
(c) What are the limitations of Unix model of file sharing? [4]
⋆⋆⋆⋆⋆
1 of 1