How To Exam?

a knowledge trading engine...


West Bengal Institute of Technology (WBIT) 2009-6th Sem B.Tech Computer Science and Engineering Computer Science -System Software and Administration - Question Paper

Wednesday, 17 July 2013 03:30Web



C8/B.TSCH (C8BJ/8EM-6/C8-604/09    3

ENGINEERING ft MANAGEMENT EXAMINATIONS, JUNE - 2009 SYSTEM SOFTWARE & ADMINISTRATION SEMESTER-6

I



time : 3 Hours 1    t Fuji Marks : 70

i

,    GROUP-A

.    (Multiple Choice Type Questions)

1. Chooeethe correct alternatives for any ten of the following:    10x1 = 10

1) Which of the following is* a Journaling file system ?

a) ext2    b) vfat

C) mlntv    d) CXt3.    ---

. ii) What is the difference between the DROP and REJECT targets in iptabies ?

a)    REJECT will send an error packet back to the source system, whereas DROP will not

b)    DROP will send an error packet back to the source system, whereas REJECT will not

c)    They are equivalent

d)    DROP is invalid, DENY must be used.

iU) Which of the following files specifies information on what Is NFS shared from your system?

a) /etc/exports    b) /etc/dfs/dfstab

c)    /etc/fstab    d) /etc/sharetab.    I-

iv) In Red Hat Linux, what is the standard init process used ?

a)    SysV init

b)    BSD init

c)    SRVtnit

d)    SysIV init

e)    OS2 Init. ,    L

v) What utility in /sbin provides a simple command-line tool for maintaining the /etc/rc.d/init.d directory hierarchy ?

a)    chkconfig

b)    ckconf

c)    chkconf

. d) checkconflg    

e) checkcf.    -

vl) Runlevel 4 stands for    *

a) Reboot    b) Shutdown

c) Multi-user mode    d) None of these.    1----------I

vii) What is the command to configure a NIS client named barney if the master NIS server is named fired ?

a) #ypinit-c fred    b) #ypinlt -c barney

c) #yplnlt -m barney    d) #yplnit -c.    L--

viil) LILO Is basically used for    .

a) loading    b) linking

c) executing    d) termination.    -

ix)    The command that is used to know the MAC address of other computer is

a) passwd    b) user add

c) arp-d    d) arp -a.    -

x)    What keeps track of all the files within the file system ?

a) super block    b) root

c)    I-node table    d) partition table.    -

xi)    Which of the following is true for IP Masquerade ?

a)    Top fin used for TCP session timeout

b)    TCP timeout after FIN

e) TCP time out before FIN

d)    None of these.    -

xli) Back patching is the technique that is used

a)    to generate tokens

b)    in IP Masquerade

c)    to solve problem of forward referencing

II


d)    in NFS.

3x5= 15


2.


a)

b) a)


3.


GROUP-B (8hort Answer Type Questions)

Answer any three of the following questions.

Describe in detail about /proc file system.

What are different daemons used in NFS service ?


What is the concept of swap space and virtual memory ? How do they differ from each other ?


4+1


b)    Describe the formal used in /etc/passwd and /etc/shadow file.

c)    How to mount the CD-ROM drive using mount command ?

2 + 2 + 1


4. a) What Is I-node ?

b)    How does ext2 file system differ from FAT-32 file system ?

c)    Change the permission of the file abc.txt such that the file is accessed by owner in write mode and the group users can access the file in read only mode and others will not be able to access the file in any form.    1+2 + 2

5.    a) What is IP Masquerade ?

b)    How Is NAT ( Network Address Translation ) used by Network users to use it effectively such that administrators can manage ?

c)    How can you change the run level of the system without restarting the system ?

2 + 2+ 1

6.    What is the working principle of DNS server ?

GROUP-C (Long Answer Type Questions)

Answer any three of the following questions.

3 x 15 = 45


7. a) Describe the duties of a system administrator,

b) Explain various utilities of Ping command.

c) What are ip tables ?

Configure a firewall using ip tables with following specifications

i) No outgoing TCP connection is allowed

ii) HTTP connection is allowed to particular machine.

iii) It should reject all FTP request.

3 + 3 + 9


8.    a) How is Assembly level language program become useful ?

b)    What are the basic Assembler functions ?

c)    Discuss 2-pass algorithm of Assembler. Explain with the aid of a neat flow chart and algorithm.

* ' ' ' \ " .

d)    What do you mean by program relocation ?

e)    What is the difference between a literal and an immediate operand.

3+2+5+3+2

9.    a) What is Eavesdropping* ? How do we protect against this type of attack ?

b) What is a firewall ?

c) What command is used to configure a firewall ? 16761 (11/06)1    

/

/


CS/B.TECH (CSE)/SEM-6/CS-604/09    7

d)    Configure a firewall for the following system :

Machine will connect the network, the Internet and the users will be able to access website but no other traffic will be allowed to pass. Additionally users will be able to log on to FTP servers on the Internet to read out and write files but people on the Internet will not be able to log on to FTP servers.

e)    Explain in brief if we have a network with class B IP of 192.72.0.0 and we want to create 32 subnets what will be the subnet mask.

f)    Explain about /etc/shadow file. .    3 + 2+1+5 + 3+1

10.    a) What is the use of each of the following files ?

i)    /etc/shadow

ii)    /etc/grub.conf . iii) /etc/inittab

iv) /etc/fstab

b)    Why is /proc file system called virtual system ?

c)    What is umask ? How can a file permission be defined by using it ?

d)    What do you mean by disk inode and incore inode ?    (4x2) + 3 + 2 + 2

11.    a) What are swap space and virtual memory ? How do they differ from each other ?

How to increase the swap space in your system ? Give an example

b) What is IP filtering ? Describe with proper diagram how - IP filtering can be implemented In kernel for different types of traffics.

F6781 (11/fffe) j

c)    What is the difference between antivirus and firewall ?

d)    What Is the difference between scheduling processes using batch and at command ?    (l + l+ 3) + 5 + 3 + 2

12. a) State the importance between Soft mount and Hard mount at NFS volume mounting options.    

b)    What is IP accounting ? How does it help the administrator to analyze the security threats of a network ?

c)    How network address translator helps the network users to use it efficiently and administrator to manage it ?

d)    Why NFS is not secure ? Describe the security threat using NFS only. How the problem can be solved inside a network ?    3 + 4 + 4 + 4

tSu WHte short notes on any three of the following :    3x5

a)    NAT

b)    NIS

c)    POT & MOT

d)    Ipfwadm

e)    System backup and recovery.

END







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER West Bengal Institute of Technology (WBIT) 2009-6th Sem B.Tech Computer Science and Engineering Computer Science -System Software and Administration - Question Paper