You are on page 1of 5

SRM Institute of Science and Technology

Faculty of Engineering and Technology


DEPARTMENT OF NETWORKING AND COMMUNICATIONS

18CSE364T – System Administration and Maintenance

Max. Marks : 25
PART – A ( 20*1 = 20 Marks)
Answer All Questions

1. Which of the following is an example of a Type 2 authentication factor?


smart card, ATM card
fingerprints, voice print
sign your name, and speak a sentence
personal identification number (PIN), lock combination

2. The purpose of authorization is to


Flag the user if he/she misbehaves
Restrict what operations/data the user can access
Determine if the user is an attacker
Determine who the user is

3. ___________________ architecture facilitates the portions of the resources available


directly to peers without the need of central coordination
a) Distributed cloud Computing Architecture
b) Data Centred Architecture
c) Hybrid Architecture
d) P2P Architecture

4. Identify the network components which is not divided into groups?


End Devices
Computers / Phone
Network Interface
Connectors
Media

5. Identify the file sharing protocols from the below options


a) Telnet
b) NFS & CIFS
c) FTP
d) HTTP

6. What are the I/O requests to disk storage on a SAN are called
a. File I/Os
b. SAN I/Os
c. Block I/Os
d. Disk I/Os

7. Which of the following is sequential access storage device?


a. Hard Disk
b. CD-ROM
c. Tape Cartridge
d. Main Memory

8. In what way the unauthorized users can be restricted in changing Home router settings.
a) Change the firewall settings on your computer.
b) Change the default administrator password and SSID.
c) Change the MAC address of the router.
d) Nothing.

9. Identify the one which is not a kind of backup type ?


Full
Decremental
Incremental
Differential
10. What is the possible cause of problem when Restore is slow
a) Compression is not supported in some environments such as OES Storage Services or
ReiserFS on OES.
b) File compression and restore are running at the same time.
c) The file attributes and name space formats are not configured on the volume you
restored to.
d) This happens when the TSA is unable to restore a particular name in a name space.

11. How many currency values supports ERP?


Single
Double
Triple
Multiple

12. ____ is the technique to handle customer response and feedback.


Customer Response Management
Customer Relationship Management
Customer Feedback Database
Customer Response Record
13. CRM can be defined by ____________ with respect to Business objectives
Customers
Agents
Company
Stakeholders

14. Find out the type , where in virtualization applications are stored and executed on the
server?
Application virtualization
Presentation virtualization
Network virtualization
Server virtualization
15. Identify the properties are the basic requirements of Fault Tolerance?
Fault Containments, Fail Safe, Fault Isolation
Data Recovery, Dynamic Recovery, Fault Isolation
Fault Containments, Data Isolation, Dynamic Recovery
Fault Containments, Dynamic Recovery, Fault Isolation

16. Identify the network which is specifically associated with Bluetooth devices
a) WAN
b) MAN
c) PAN
d) LAN

17. ______________ is a key for Success/Failure of a Grid Computing Model


a) Resource Architecture
b) Service Level Agreement Architecture
c) Security Architecture
d) Distributed Architecture

18. The Network Attached Storage (NAS) has limited performance, when _______ are
many and complex _______________ .
a) Resources , Process
b) Threads , Process
c) Users , I/O process
d) Users , CPU Process

19. What will be the survival rate at the end of the 3 rd year if the hypothetical retention rate is
1.0, in CRM system?
a) 0.56
b) 1.0
c) 2.89
d) 8.9

20. __________ reduces manual effort and store a large amount of data in small space.
A. Office Automation System
B. Decision Support System
C. Transaction Process System
D. Automation System
Part – B ( 5 Marks)

Set 1
1. List out the characteristics of office automation system (2)

2. What is Fibre Channel SAN? Specify its benefits and limitations (3)

Set 2
1. List the type of CRM software based on installation and functionality(2)

2. How an Broken Backup Chain Backup and recovery implemented?(3)

Set 3
1. What are the factors influencing in selecting cloud based backup. (2)

2. Give a short notes on File level virtualization, with its benefits and limitations. (3)

Set 4
1. List out the issues faced by the business enterprises for not adopting backup and
recovery methods. (2)

2. Give a short notes on Internal DAS with diagram (3)

You might also like