Professional Documents
Culture Documents
1. What are the Roles and Responsibilities of System Administrator? Write the
steps for creating the User account, setting permissions and protecting your files
with password.
The system administrator’s responsibilities are diverse and involve many areas of an
organization’s technology systems.
Research upcoming products, service protocols, and standards in support of systems software
procurement and development efforts.
Install and configure local area networks (LANs), wide area networks (WANs), and network
segments and servers, such as file servers, VPN gateways, and intrusion detection systems.
Ensure an uninterrupted internet connection and manages mail servers for sending and
receiving emails and file servers for saving and managing data.
Manage user accounts, credentials, permissions, access rights, storage allocations, and active
directory administration.
Secure system integrity from any breaches or viruses and play an essential role in risk-
mitigation planning, including creating backup plans, safeguards for data, user security
policies, and identity management.
2. Write the steps for disk partitioning and perform operations like shrinking,
Extending, deleting and formatting.
Shrink the existing volume:
1. Type and search [Computer Management] in the Windows search bar, then click [Run
as administrator].
2. In Computer Management, select [Disk Management].
3. In Disk Management, right-click the existing volume you want an
additional partition, then select [Shrink Volume].
4. Shrink volume will automatically calculate the maximum space that you can shrink, you
also can enter the size you want to shrink, and then select [Shrink].
5. After the shrink is completed, an unallocated region will be created in Disk
Management, and then you can use the unallocated region to create a new partition.
Extend the existing volume:
1. Type and search [Computer Management] in the Windows search bar, then click [Run as
administrator].
2. In Computer Management, select [Disk Management].
3. In Disk Management, right-click the existing volume you want to extend, then
select [Extend Volume].
4. In Extend Volume Wizard, select [Next].
5. Enter the size of the volume you want to extend or accept the maximum default size,
and then select [Next].
6. The volume extension is completed, confirm the following settings you set up, and then
select [Finish].
Deleting Volume:
1. Type and search [Computer Management] in the Windows search bar, then click
[Run as administrator].
2. In Computer Management, select [Disk Management]. In the Disk Management
window, you see a list of available hard drives.
3. Locate the partition you want to delete.
4. Right-click that partition and select the Delete Volume option from the drop-down
menu that appears.
5. A pop-up message appears to confirm that you want to delete the partition; click yes.
6. Once the partition is deleted, it is listed as unallocated space.
Create New Partition:
1. Type and search [Computer Management] in the Windows search bar, then click
[Run as administrator].
2. Right-click an unallocated region on your hard disk, and then select New Simple
Volume.
3. In the New Simple Volume Wizard, select Next.
4. Enter the size of the volume you want to create in megabytes (MB) or accept the
Maximum default size, and then select Next.
6. Accept the default drive letter or choose a different drive letter to identify the partition,
and then select Next.
7. Click on Finish.
5. Write the steps to make Microsoft Chrome as a default browser, Add Active X Controls
and Add–on to the Browser?
Make Default Browser:
1. Once downloaded, open Google Chrome.
2. Click the three vertical dots in the upper-right corner to open the menu.
3. Select Settings from the list.
4. Click on Default browser from the menu on the left.
Add Add-on to chrome:
1. Click on Default browser from the menu on the left.
2. Search or browse for the extension you want to add to Chrome. Click the extension
to open its details page.
3. Click Add to Chrome. In the pop-up, click Add extension.
4. After a moment, the extension will be added to Chrome.
Add Active-x Controls:
Step 1
Open your Google Chrome browser.
Step 2
Click on the Google Chrome menu option (three horizontal or vertical lines/dots, depending
on the version that you have installed).
Step 3
Click on Settings.
Step 4
Scroll to the bottom of the page and select Advanced
Step 5
Navigate to the System section.
Step 6
Select Open Proxy Settings and a new popup window will appear.
Step 7
Click on the Security tab and select Custom Level (located under the Security Level for This
Zone section).
From there, you will be able to see all the security settings that you can change. Scroll down
and select the Prompt option for both “Download Signed ActiveX Controls” and “Download
Unsigned ActiveX Controls sections”. Also, make sure that Enable has been checked in the
“Run ActiveX Control and Plug-Ins” section.
Click on ‘OK‘and restart your browser for the changes to be saved.
8. What is Wi-Fi? How do you configure the Wifi on Windows operating system?
Wi-Fi is a wireless networking technology that allows devices such as computers
(laptops and desktops), mobile devices and other equipment to interface with the
Internet. It allows these devices--and many more--to exchange information with one
another, creating a network.
Internet connectivity occurs through a wireless router. When you access Wi-Fi, you are
connecting to a wireless router that allows your Wi-Fi-compatible devices to interface
with the Internet.
1. Once you've acquired a wireless router, you'll need to connect it to your existing
Internet modem.
2. Connect an Ethernet cable from your modem to the wireless router.
3. Plug in the power cable for the wireless router.
4. you'll need to use your computer to configure your router's default settings
5. Using your web browser, enter the router's default IP address into the address bar,
then press Enter.
6. some of the most common addresses include 192.168.0.1, 192.168.1.1, and
192.168.2.1.
7. The router's sign-in page will appear. Again, the exact sign-in details should be
included with your router's instructions.
8. Your router's settings page will appear. Locate and select the Network Name setting,
then enter a unique network name.
9. Locate and select the Network Password setting, and choose an Encryption option.
There are several types of encryption you can use, but we recommend WPA2, which is
generally considered to be the most secure.
10. Enter your desired password. Make sure to use a strong password to help ensure no
one else can access your network.
11. Locate and select the Save button to save your settings.
9. What are the features of firewall? Write the steps in providing network security
and to set Firewall Security in windows?
Firewall:
A firewall is a network security system that is designed to prevent unauthorized access to or
from a private network.
It is a security best practice to use a firewall, especially for businesses that have confidential
customer data to protect. Enabling your firewall is a common security policy and procedure to
protect you and your company.
You can implement a firewall in both hardware and software, or a combination of both.
Frequently, businesses use network firewalls to prevent unauthorized Internet users from
accessing private networks connected to the Internet.
Steps Providing Network Security:
1. Open the Control Panel in Windows.
2. Click on System and Security.
3. Click on Windows Firewall.
4. If your firewall is disabled, you’ll see Windows Firewall marked “Off.” To turn it on, in
the left navigation pane, you can click on Turn Windows Firewall on or off.
5. In the Customize Settings window, select Turn on Windows Firewall and click OK.
12. .Write a Program to identify the category of IP address for a given IP address?
#include <stdio.h>
#include <string.h>
void extractIpAddress(unsigned char *sourceString,short *ipAddress)
{
unsigned short len=0;
unsigned char oct[4]={0},cnt=0,cnt1=0,i,buf[5];
len=strlen(sourceString);
for(i=0;i<len;i++)
{
if(sourceString[i]!='.'){
buf[cnt++] =sourceString[i];
}
if(sourceString[i]=='.' || i==len-1){
buf[cnt]='\0';
cnt=0;
oct[cnt1++]=atoi(buf);
}
}
ipAddress[0]=oct[0];
ipAddress[1]=oct[1];
ipAddress[2]=oct[2];
ipAddress[3]=oct[3];
}
int main()
{
unsigned char ip[20]={0};
short ipAddress[4];
extractIpAddress(ip,&ipAddress[0]);
printf("\nIpAddress:%03d.%03d.%03d.%03d\n",ipAddress[0],ipAddress[1],ipAddress[2],ipAddr
ess[3]);
return 0;
}
Output:
Enter IP Address (xxx.xxx.xxx.xxx format): 145.160.017.001
Ip Address: 145. 160. 017. 001
Class B Ip Address.
// Strength of password
cout << "Strength of password:-";
if (hasLower && hasUpper && hasDigit &&
specialChar && (n >= 8))
cout << "Strong" << endl;
else if ((hasLower || hasUpper) &&
specialChar && (n >= 6))
cout << "Moderate" << endl;
else
cout << "Weak" << endl;
}
int main()
{
string input = "Password@124";
printStrongNess(input);
return 0;
}
Output:
Strength of password:-Strong
16. Write a Program to search the given pattern using optimized algorithm
#include <stdio.h>
#include <string.h>
void search(char pat[], char txt[])
{
int M = strlen(pat);
int N = strlen(txt);
int i = 0;
while (i <= N - M) {
int j;
21. What is Malware? Write the steps to remove the malware from your PC?
Malware:
Malware is intrusive software that is designed to damage and destroy computers and
computer systems. Malware is a contraction for “malicious software.” Examples of common
malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.
Removing a computer Malware from a PC:
Step 1: Download and install a virus scanner
Step 2: Disconnect from internet.
When you are removing a virus from your PC, it is a good idea to disconnect from the internet
to prevent further damage: some computer viruses use the internet connection to spread.
Step 3: Reboot your computer into safe mode:
Step 4: Delete any temporary files
22. What are the various types of Vulnerabilities for hacking the web applications
some of the most common attacks that hackers might attempt on your website. Knowing these
common web application vulnerabilities.
1: SQL Injection
Many hackers start with an attempt to gain access to the database through SQL injection attacks.
This is when the attacker inserts malicious SQL statements into form fields and other injection points,
with the intention of gathering information from and controlling the database. They can use this
information to access and modify or even destroy the information, and to attack the underlying
system.
Attackers typically use these attacks to collect vital customer information such as their contact
information, passwords, or even credit card info. They may even exploit these web security
vulnerabilities to change the price of a product, for instance. Advanced attacks can even allow them
to control the database server and the operating system.
As mentioned earlier, cross-site scripting or XSS is one of the most popular web application
vulnerabilities that could put your users’ security at risk. These attacks inject malicious code into the
running application and executes it on the client-side.
The goal of XSS attacks is to send this malicious code to other users, sometimes infecting their
devices with malware or stealing sensitive information. This type of website application vulnerability
can give the attacker full control of the user’s browser and can be extremely dangerous to any
website.
3: Authentication Failure
One of these vulnerabilities is Credential Stuffing, where an attacker will test a list of valid passwords
and usernames gleaned from another breach or attack until they manage to find a valid combination
and gain access.
4: Security Misconfiguration
Security misconfigurations provide attackers with an easy way into your website, making it one of the
most critical web application vulnerabilities that you need to prevent.
Unused pages, unpatched flaws, unprotected files and directories, and default configurations, are
some of the security misconfigurations that attackers can leverage to gain unauthorized access.
Every level of your application stack can be vulnerable to security misconfigurations. This includes
your web server, platform, database, network services, storage, frameworks, application server, and
more.
An XML external entity attack, also known as an XXE, or an XML injection attack, is another class of
vulnerabilities you should watch out for. These types of attacks occur when attackers exploit a weakly-
configured XML parser. Through such attacks, attackers can inject additional data, access confidential
data, and execute applications and create remote tunnels (shells).
XML external entity attacks can also result in remote code execution, Server Side Request Forgery
(SSRF), and more. By default, most XML parsers are prone to these attacks. This leaves it up to the
developers to ensure that their web application is free from these web application vulnerabilities.
Access control helps you control what sections of a website and what application data different
visitors can access.
For instance, if your website is a platform for different sellers to list their products, they will need
some kind of access to add new products and manage their sales. However, not every visitor will need
that level of access since most of them are visiting your site to buy products.
As such, having a broken access control opens up your site to web application vulnerabilities, which
attackers can exploit to access sensitive information or unauthorized functionality. They might even
use these attacks to make modifications to access rights and user data.
23. Write steps for sharing files and printer remotely between two system
Follow these steps to connect two computers having a Windows Operating system to share
the files between them:
Step 3: Click on option Change Advanced Sharing Settings in the upper-left side of the
window.
Step 4: Turn on file sharing. Check the Turn on file and printer sharing.
To share a printer:
24. List out the various Mobile security apps. Write the steps to install and use, one
of the mobile security app.
Mobile Security Applications for Android:
1. Avast Mobile Security
Avast is a great app to provide your Android phone protection against viruses coupled with
many other threats.
2. Malware bytes
Safeguard your Android devices from ransom ware, malware, and other threats using the
advanced protection of Malware bytes.
3. VIPRE
One of the popular security apps – VIPRE Android Security, is a great alternative. It puts the
security of your device first by safeguarding from malware and viruses for Androids.
4. Lookout
Lookout is literally always on the “lookout” for suspicious activities and threats.
5. Safe Security
Everything you need for protection against viruses, Safe Security, also helps you clean and
speed up your device.
Steps to Install Avast Mobile Security:
1. On your Android device, tap the button below to open the Avast Mobile Security product page in Google Play
Store.
2. Tap Install to download and install the app. When installation is complete, tap Open
3. Tap Get started to confirm that you accept Avast's Agreement and Privacy Policy, then tap Next
4. Select one of the options 1.Purchase 2.Free Version.
5. Avast Mobile Security is now installed on your Android device
Procedure:
Step2: Take new slide: go to Home tab -> slides ->select new slide
Step5: select a slide and write the content regarding the topics then apply transitions
Go to animation tab -> transition to this slide group ->select any one transition.
Step7: repeat step 4 and 5 until to apply custom animations to all slides
33. Write an algorithm and Program for encrypting a plain text and decrypting a cipher text
using Caesar Cipher.
else
return (((long long int)pow(a, b)) % P);
}
int main()
{
long long int P, G, x, a, y, b, ka, kb;
return 0;
}
Output:
The value of P : 23
The value of G : 9
40. Write an algorithm and Program to generate Pseudo Random numbers in a rang.
Pseudo Random Number Generator (PRNG) refers to an algorithm that uses mathematical formulas
to produce sequences of random numbers. PRNGs generate a sequence of numbers approximating
the properties of random numbers.
#include<stdio.h>
#include<stdlib.h>
#include<time.h>
int main()
{
srand(time(NULL));
int i;
for(i = 0; i<5; i++)
printf("%d\t", rand()%10);
}
Output 1:
3 7 0 9 8
Output 2:
7 6 8 1 4
Procedure:
Step2: Take new slide: go to Home tab -> slides ->select new slide
Step5: select a slide and write the content regarding the topics about various Cyber Attacks then
apply transitions
Go to animation tab -> transition to this slide group ->select any one transition.
Step7: repeat step 4 and 5 until to apply custom animations to all slides
50. Write the steps to read Email Headers and identify them as SPAM.
You can easily view email headers in Gmail by following the steps below on a desktop
computer or laptop.
1. Open your Gmail client and select the email that has the message header you want to
view.
2. Access the kebab menu by clicking on the three dots beside the “Reply” button once
you see the message body.
3. Next, select “Show Original” in the dropdown menu.
4. A new window will pop up, displaying the longer header in its original HTML format.
You’ll be able to view header details such as authentication statuses, IP addresses,
MIME version, and DKIM signature.
5. Click on “Download Original” if you want to install and inspect the header data
individually.
There are 3 types of verification checks a properly configured set of emails should PASS:
DKIM, SPF, and DMARC
By checking various email header fields
1. Mismatched sender addresses or domains
2. Email travel path and email client.Most emails originate from a client (i.e. Outlook,
Gmail), and all emails pass through at least 2 servers (source, destination), but often
more. These are interim hops are visible in the header.