How To Exam?

a knowledge trading engine...


West Bengal Institute of Technology (WBIT) 2010-6th Sem B.Tech Computer Science and Engineering Computer Science -System Software and Administration - Question Paper

Wednesday, 17 July 2013 03:25Web



Name :---------------------------------------------------------

RoU.No : ......................................................................................... .. ...............

Invigilator's Signature :...............................................

CS/B.TECH (CSE)/SEM-6/CS-604/2010

2010

SYSTEM SOFTWARE & ADMINISTRATION

Time Allotted : 3 Hours    - Full Marks : 70

The figures in the margin indicate JuR marks.

Candidates are required to give their answers in their own words

as far as practicable.

GROUP - A ( Multiple Choice Type Questions )

1. Choose the correct alternatives for the following :

10x1 = 10

1) Which of the following is START* ?

a)    Machine-op .

b)    Pseudo-op

c)    Can be either of above two

d)    None of these.

ii) Link editor is an instance of

0 an editor    b) an asembler

c) a binder    d) none of these.

CS/B.TECH (CSEJ/SEM-6/CS-604/2010

m Execute permission on a file is required to

a)    launch that file as a program

b)    create a directory with a matching name

c)    allow other users to read the file

d)    use the insmod command to add the file as a module.

iv)    The Shadow Password system enhances security by

a)    checking that new passwords entered for users are not easily guessed

b)    hiding encrypted passwords in a file that only root can read

* c) validating member of the group as they log in

d) hone of these.

v)    Based on the following line from a users crontab file, when will the Brekeleylives program be run ?

0 12 3 * Brekeleylives :

a) At 1 : 23 A.M. everyday

. b) . At 1 : 00 AIM. on March 2

c)    At 1 : 00 A.M. on February 3

d)    At 2 : 00 A.M. on March 2.

CS/B.TECH (CSEJ/SEM-6/CS-604/2010

vl) When you run the umask command, you see the following result: 0000. The next time you create a file, what will be the permissions ?

a)    drwxrwxrwx    '

b)    ........ .......

c)    - rwxr-x-r-x

d)    - rw-rw-rw-.

vii) When UNUX boots, what configuration file does LINUX use to see what NFS shares to mount ?

a)    /etc/exports

   b)    /etc/nfs.conf

c)    /etc/fstab

d)    /nfs/conf.

vili) Which of the following commands check the setup of the database on your DNS server ?

a)    dnscheck

b)    BIND

c)    dig

d)    resolve.

CS/B.TECH (CSEJ/SEM-6/CS-604/2010

ix)    Consider the following command :

# iptables - A INPUT-s 192.168.77.77 - j REJECT

What effect will this have when the client with an IP of 192.168.77.77 tries to connect to your system ?

a)    No effect at all.

b)    Access will be denied, and the client computer wont get any message on what happened.

c)    Access will be denied, and the client application will get a message that the target destination is unreachable

d)    You will receive a notification message on the system console.

x)    To see the partition table, which of these commands is used

a) fsck    b) fdisk-1

c) du    d) none of these.

GROUP-B ( Short Answer Type Questions )

Answer any three of the following. 3 x 5 = 15

2.    How forward reference is tackled by one pass and two pass assemblers ?

3.    List the different runlevels. How do they differ ? List some standard shutdown techniques.

4.    What do you mean by Network Address translation ?

5.    What is the difference between sharing information through NIS and through NFS ? Differentiate between NIS and NIS +.

6.    Distinguish between Disk Inode and Incore Inode.

GROUP - C ( L6ng Answer Type Questions )

- Answer any three of the following. 3x 15 = 45

7.    a) What is firewall ?

b)    What is IP spoofing ?

c)    How is it resolve using firewall ?

d)    Explain in detail of Ipfwadmcommand.

e)    What is the difference between antivirus and firewall ?

f)    How many run levels are there in Linux ? Describe their functions. How do you know the current run level ?    2 + 2 + 3 + 3 + 2 + 3

8.    aj Explain working principle of macro processor.

b)    Compare compiler y- and go loader with absolute loader.

c)    Discuss the working principle of relocation linker.

d)    Why is relocation needed ?    5 + 5 + 4 + 1 6301 5 [ Turn over

9.    a) What are the advantages and disadvantages of NIS

server ?

b)    What are the packages needed to install NIS server and client ?

. , ' ' . ' . ' '

c)    Explain in detail of netstat command, t

d)    Configure the NFS server with the following requirements :

Machine 192.168.1.20 is able to mount/home/test directoiy of the server ( 192.168.1.10 ) in read-only mode. Machine 192.168.1.21 is able to mount /home/test directoiy of the server ( 192.168.1.10 ) in read/write mode. The range of machines (192.168.1.64 -192.168.1.128) is able to mount/home directoiy in read/write mode.    $ + 4 + 3 + 5

10.    a) Configure the firewall using iptables as follows :

Machine will receive all incoming icmp packets ( only echo-request ) from any source. It will reject all outgoing TCP connections to 2 particular destination. It will only receive ftp connection from a specific machine. Show the final configuration of each available chain.

b) What is the use of IP Accounting facility ? Write the . general sjmtax for tpfwadm, ipehains and iptables commands for IP Accounting.    6 + ( 3 + 6 )



11. a) What is the role of ah assembler ? Give the step of general design procedure of assembler.    2 + 3

b)    What is the working principle of FTP ?    5

c)    Answer the following:    ' 5 x1

. . '. *

ft What is daemon ?

ifl What happen if we write init 0 in the prompt and

- press enter ?

til) What is an I-node ?

iv)    What is the port of FTP ?

v)    What is port of HTTP ?

6301

i







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER West Bengal Institute of Technology (WBIT) 2010-6th Sem B.Tech Computer Science and Engineering Computer Science -System Software and Administration - Question Paper