Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
What is the meaning of the term “Fully Qualified Domain Name”? Write down the name of any three technologies which comprise a complete IDA solution.
Using the Active Directory Domains and Trusts console, it is probable to make a variety of different types of trusts between domains and forests. Make a distinction between the “Realm Trust&rd
What are the two primary techniques of implementing security? Briefly describe each one. Give the three elements which determine a user’s access and which define the permissions they have to obj
Make a distinction between “Deadlock Prevention” and “Deadlock Avoidance”. Give detailed description about how recovery from deadlocks can be made possible.
Make a distinction between “Message passing” and “Shared memory”. Use diagrams to demonstrate your answer. Explain what a virtual machine is and give some merits and deme
Supposing, that as a network engineer, you are supposed to execute a firewall, how would you go on to select the right firewall for organisation? Illustrate the differentiations between Host-based IDS
In order for User A to send User B an e-mail message that only User B can read, User A must encrypt the e-mail with which of the following keys?
Make a distinction between Distributed Denial of Service (DDoS) and Denial of Service (DoS). What do you understand by the term Intrusion Detection Systems?
Considering the comparison of Windows and Linux NOS, comment on Virus Vulnerability and Security Issues. Name five types of Internet Protocols function at the Network layer of OSI Model.
Write down any two reasons why Linux Operating System is better than one of its competitors. What is the significance of the “touch” command? Give one of its demerits.
List and describe the syntax of time related system calls. Which are the actions taken by kernel while unmounting a file system?
What are block and character device switch tables? Which system call is used to create the device file?
What do you mean by callout table? What is its usage? What is inode reference count? What do you mean by inode reference count= 0 and inode reference count > 0?
Explain with an appropriate diagram the logical structures of Active Directory components. Explain in detail the FAP (File Access Permissions) for a file using the chmod command.
You have been posted as a System administrator for the Help Desk division of a legal firm situated in Ebene (Head Office). The firm has several branch offices spread over the island.
What do you mean by scheduling? Describe about Round robin scheduling algorithm with appropriate example.
Consider a system in which it is desired to separate policy and mechanism for the scheduling of kernel threads. Suggest a means of achieving this goal.
What do you mean by memory management? What are the deadlocks –system models? Also classify dead states.
Discuss virtual memory management. Describe demand paging & page replacement algorithm.
Describe the concepts of Segmentation and Paging of a Virtual memory.
Explain mutual exclusion primitives. Describe Dekker’s Algorithm of mutual exclusion primitives.
What is Highest Response Ratio Next Scheduling? How does it overcome the starvation problem of the SJF.
Write the Peterson’s algorithm for the mutual exclusion problem and describe for the same.
How does surveillance programs are used in the threat monitoring?
Explain some checks a surveillance program might make to find out, if a user is attempting to corrupt a critical file.