Code No: RR411503

Set No. 1

IV B.Tech I Semester Supplementary Examinations, February 2007 NETWORK ADMINISTRATION (Computer Science & Systems Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. (a) Write about the hierarchical file system structure of Unix. (b) What is a link? How many types of links are in Unix? (c) Write about file access control in Unix. 2. (a) What is dual boot? [10] [3] [3] [2]

(b) What are the choices of file systems when installing different Microsoft operating systems? [8] (c) Write short notes on Grub - the boot manager. (d) What is un-attended installation? 3. (a) Explain the role played by Cfengine is killing old processes. (b) Explain how the old processes are killed in Unix (c) How are user resources controlled for“moving users and deleted users”? [4] [2] [6] [6] [4]

4. (a) Describe the central management “Star model” of network administration.[8] (b) Describe the start model in intermittently connected environment. 5. (a) What are the common assumptions in synchronizing the clock? [8] [8]

(b) What are the advantages in maintaining the configuration with clock synchronization? [8] 6. (a) What are the ways involve to start network daemons? (b) What role does inetd play for application services. 7. Explain the methodology of“Intrusion Detection and Forensics”. 8. (a) Explain how complex systems are analyzed. (b) How evaluation of hierarchical system is simulated. [8] [8] [16] [ 8] [4]

(c) Write about various options to perform experimental studies in evaluating hierarchical system. [4] ⋆⋆⋆⋆⋆

1 of 1

Code No: RR411503

Set No. 2

IV B.Tech I Semester Supplementary Examinations, February 2007 NETWORK ADMINISTRATION (Computer Science & Systems Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. (a) Define Network Infrastructure. (b) Write about the main components of human-computer system. [6] [6]

(c) What are the meta-principles of system administration? Briefly explain about each. [4] 2. (a) Define the terms i. ii. iii. iv. free software proprietary software shared libraries software patches [8] [6] [4] [6] [4] [8]

(b) What are the exceptions involved in configuring security. Explain. 3. (a) What is meant by account policy? (b) What should an account policy contain? (c) “Simples is the best”, suggest the maxim for the account policies. 4. (a) Write about popularly used network management technologies.

(b) How does SNMP network management support user management in Windows? [6] (c) What is a peer-peer application? How SNMP does supports peer-peer network management. [6] 5. (a) Explain the purpose of randomized topological sorting algorithm during system configuration. [8] (b) Justify the need of variable configuration. (c) Define Randomization. 6. (a) What are the ways involve to start network daemons? (b) What role does inetd play for application services. [6] [2] [8] [8]

7. (a) Describe how password security is useful when analyzing network security. [8] (b) Explain network services during network security. [8]

1 of 2

Code No: RR411503

Set No. 2
[4]

8. (a) What are similarities and differences between stochastic and deterministic behaviors? [8] (b) Describe the nature of stochastic variables (processes). (c) What is meant by random errors? Why computers are not immune to random errors. Give a probabilistic explanation. [4] ⋆⋆⋆⋆⋆

2 of 2

Code No: RR411503

Set No. 3

IV B.Tech I Semester Supplementary Examinations, February 2007 NETWORK ADMINISTRATION (Computer Science & Systems Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. (a) What are the common constraints on Mac OS infrastructure [6]

(b) How the restrictions of ”constraints on infrastructure” on the server hosts are resolved. [6] (c) Define user behavior. 2. (a) Define the terms i. ii. iii. iv. free software proprietary software shared libraries software patches [8] [16] [6] [6] [4] [8] [4] [8]

(b) What are the exceptions involved in configuring security. Explain. 3. Explain different issues of user management 4. (a) What role does revision control play in system administration (b) Explain the importance of MIB to help SNMP function efficiently. (c) How does software synchronization help in revision control? 5. (a) Write in detail about monitoring tools for configuration management.

(b) What are the advantages of generalized scripting languages in configuration automation? [8] 6. How do system5init, BSDinit, inetd configuration services work in summoning daemons. [16] 7. (a) Explain the idea behind Virtual Private Network (VPN). (b) Describe, Analyzing Network Security and its factors [8] [8]

8. (a) Describe the features of delta distribution representing complete certainty. [6] (b) Explain the significance of “Adding up of independent causes” (c) Define the principle of Uncertainty. ⋆⋆⋆⋆⋆ [6] [4]

1 of 1

Code No: RR411503

Set No. 4

IV B.Tech I Semester Supplementary Examinations, February 2007 NETWORK ADMINISTRATION (Computer Science & Systems Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. (a) Compare file system of Windows with Unix. (b) Compare workstations of Windows with Unix. [8] [8]

2. (a) “Partitioning of disks plays a very important role in configuring and personalizing workstations”, Explain. [8] (b) Describe the maintenance of file system. 3. (a) What are the special considerations required for distributed accounts? (b) What mechanisms exist for the users to share file in Unix. (c) What are the limitations of Unix model of file sharing? 4. Explain the mesh model of network administration on logistic networks. 5. (a) Explain the need of configuration automation. (b) Explain the selection of tools for automation of configuration. 6. Write short notes on (a) Compiling and installing sendmail (b) Configuring sendmail (c) Relaying (d) Spam and Junk mail 7. (a) What is firewall? How does firewall work? (b) Compare different types of firewalls. 8. (a) Explain how a dynamic system can be parameterized. (b) Describe the importance of observational errors of evaluation. ⋆⋆⋆⋆⋆ [8] [8] [8] [8] [8] [6] [6] [4] [16] [8] [8] [16]

1 of 1