Mcs 022 Pyqs
Mcs 022 Pyqs
Q1.
(b) Why do we need a firewall ? Explain the working of the firewall in detail . Also
explain the limitation of using firewalls.
(c) Differentiate between FAT32 and FAT16 file systems. Explain the features of NTFS
in context of Windows 2000 OS.
Answer
Sure, here are the answers:
(i) To list all hidden files in a directory in Linux/Unix, you can use the following command:
bash
ls -a
(ii) To list all processes currently running on the system, you can use the following command:
bash
ps -aux
(iii) To set permission to a file, say "sample.txt", so that the file can be read by the owner
only, you can use the following command:
bash
chmod 400 sample.txt
(iv) To print the last 10 lines of a file, you can use the following command:
bash
tail -n 10 filename
(v) To show all users currently logged on, you can use the following command:
bash
who
(b) Firewall: A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. Its primary purpose is to
establish a barrier between your internal network and incoming traffic from external sources
(such as the internet), allowing only authorised traffic to pass through while blocking or
filtering out unauthorised or potentially harmful traffic.
Working of Firewall: Firewalls work by examining packets of data passing through them
and determining whether to allow or block them based on a set of predefined rules. These
rules can be based on various criteria such as source and destination IP addresses, ports,
protocols, and the state of the connection.
Firewalls can operate at different layers of the OSI model, including the network layer (using
techniques like packet filtering), the transport layer (using techniques like stateful
inspection), and the application layer (using techniques like proxy servers).
1. Limited Visibility: Firewalls cannot inspect encrypted traffic beyond the header
information, which means they may not detect certain types of threats hidden within
encrypted data.
2. Application Layer Threats: Firewalls may not effectively protect against threats that
exploit vulnerabilities in specific applications or protocols, especially if those threats
are not explicitly blocked by firewall rules.
3. Advanced Threats: Sophisticated attacks, such as zero-day exploits or targeted
malware, may bypass traditional firewall defenses.
4. Insider Threats: Firewalls cannot prevent threats originating from within the network,
such as malicious insiders or compromised devices.
● FAT16 (File Allocation Table 16-bit): It is an older file system introduced with DOS
3.0 and limited to a maximum partition size of 2GB. It uses 16-bit file allocation
tables, which means it has limitations in terms of maximum partition size and file size.
● FAT32 (File Allocation Table 32-bit): It is an extension of FAT16 introduced with
Windows 95 OSR2. It supports larger partition sizes (up to 2TB) and file sizes (up to
4GB). FAT32 uses 32-bit file allocation tables, providing better efficiency and support
for larger storage devices.
● Security: NTFS supports access control lists (ACLs), which allow fine-grained
control over who can access files and folders, providing better security compared to
FAT file systems.
● Compression: NTFS supports file and folder compression, allowing users to save
disk space by compressing data on-the-fly.
● Encryption: NTFS supports file-level encryption using the Encrypting File System
(EFS), providing a way to encrypt sensitive data stored on disk.
● Journaling: NTFS uses a journaling file system, which helps in recovering from
system crashes and ensures the integrity of the file system.
● Large Volume and File Support: NTFS supports much larger volumes and file sizes
compared to FAT file systems, with maximum volume size of up to 16 exabytes and
maximum file size of up to 16 terabytes (depending on the version of Windows).
1. X Server: The X server is responsible for managing the display hardware and
handling input devices such as keyboards and mice. It communicates with client
applications and renders their graphical output on the screen.
2. Window Manager: The window manager controls the placement and appearance of
windows on the screen. It allows users to manipulate windows (move, resize,
minimise, maximise, etc.) and provides features like window decorations and
taskbars.
3. Desktop Environment: A desktop environment is a collection of software
components that provide a complete user interface experience, including a window
manager, file manager, panel, and various desktop utilities. Examples include
GNOME, KDE, Xfce, and LXDE.
4. Widgets and Toolkits: Widgets are graphical elements such as buttons, text boxes,
and sliders, while toolkits are libraries that provide programming interfaces for
creating and managing widgets. Common toolkits used in Unix-based GUIs include
GTK (used by GNOME), Qt (used by KDE), and Motif.
5. Display Manager: The display manager is responsible for managing user sessions
and handling login screens. It provides a graphical login interface where users can
enter their credentials to access the system.
Q2
(a) What do you mean by Packet Switching? Explain the Datagram and Virtual Circuit
approach of packet switching.
(b) Explain POP3 and IMAP Protocols.
(c) What are Guided and Unguided Media ?Explain optical fibre. List the advantages
and disadvantages of unguided media.
Answer:-
(a) Packet Switching: Packet switching is a method used in data networking for transmitting
and routing data across a network. In packet switching, data is broken down into smaller
units called packets, which are then transmitted individually across the network. Each packet
contains not only the data being transmitted but also header information, including the
source and destination addresses.
Datagram Approach: In the datagram approach of packet switching, each packet is treated
independently and can follow different paths to reach its destination. Each packet is
forwarded based on the destination address contained within the packet itself. Routers and
switches in the network make independent decisions about how to route each packet, often
choosing the most efficient path available at the time of transmission. This approach is used
in IP (Internet Protocol) networks, where each packet is treated as a separate entity and can
take different routes through the network.
Virtual Circuit Approach: In the virtual circuit approach of packet switching, a predefined
path or circuit is established between the source and destination before data transmission
begins. Once the circuit is established, each packet follows the same path through the
network. This path is determined during the setup phase and remains fixed for the duration
of the communication session. Virtual circuits provide more predictable routing and may offer
better quality of service (QoS) compared to datagram networks. This approach is used in
protocols like ATM (Asynchronous Transfer Mode) and Frame Relay.
(b) POP3 and IMAP Protocols: POP3 (Post Office Protocol version 3): POP3 is an email
retrieval protocol used by email clients to retrieve emails from a remote server. When a user
accesses their email account using a POP3 client, the client downloads emails from the
server to the user's device. By default, POP3 downloads emails to the client device and
typically deletes them from the server, although there are options to leave copies on the
server.
IMAP (Internet Message Access Protocol): IMAP is another email retrieval protocol used
by email clients to access emails stored on a remote server. Unlike POP3, IMAP allows
users to view and manage emails directly on the server without downloading them to the
client device. This means users can access their full mailbox from multiple devices while
keeping emails synchronised across all devices. IMAP also supports folder management
and searching capabilities.
(c) Guided and Unguided Media and Optical Fibre: Guided Media: Guided media refers
to communication channels that use physical conductors or cables to transmit data signals.
Examples include twisted pair cables, coaxial cables, and fibre optic cables. Guided media
provide a controlled environment for signal transmission, reducing the chances of signal
interference and attenuation.
Unguided Media: Unguided media, also known as wireless or unbounded media, refers to
communication channels that transmit data signals through the air or free space. Examples
include radio waves, microwaves, and infrared signals. Unguided media are susceptible to
various environmental factors such as interference, attenuation, and multipath propagation.
Optical Fibre: Optical fibre is a type of guided media that uses thin strands of glass or
plastic fibres to transmit data signals using light waves. Optical fiber offers several
advantages over other guided and unguided media, including: Advantages:
● High Bandwidth: Optical fibre has a much higher bandwidth compared to traditional
copper cables, allowing for faster data transmission over longer distances.
● Low Attenuation: Light signals in optical fibre experience low attenuation, meaning
they can travel longer distances without significant loss of signal strength.
● Immunity to Electromagnetic Interference: Optical fibre is immune to electromagnetic
interference, making it ideal for use in environments with high levels of electrical
noise.
● Security: Optical fibre is difficult to tap into, providing a higher level of security
compared to wireless or copper-based communication channels.
Disadvantages:
● Cost: Optical fibre installation and maintenance can be expensive compared to other
communication mediums.
● Fragility: Optical fibre cables are delicate and can be damaged easily if mishandled,
requiring careful installation and maintenance.
● Limited Flexibility: Optical fibre cables are less flexible than copper cables, which can
make installation in certain environments more challenging.
Overall, optical fibre is widely used in telecommunications networks for high-speed data
transmission over long distances, offering advantages in terms of bandwidth, reliability, and
security.
Q3
(a) Define Topology in the context of Computer Networks. List the advantages of
Computer Network.
(b) Explain the working of Ring Topology.
(c) Explain the process of ApacheServer setting in Linux in detail.
Ans:-
(a) Topology in Computer Networks: Topology refers to the physical or logical layout of
devices and connections in a computer network. It defines how devices are interconnected
and how data is transmitted between them. Different types of network topologies include
bus, star, ring, mesh, and hybrid topologies.
1. Resource Sharing: Computer networks allow for the sharing of hardware resources
such as printers, scanners, and storage devices, as well as software resources such
as applications and databases.
2. Communication: Networks facilitate communication and collaboration among users,
allowing them to share information and communicate in real-time via email, instant
messaging, video conferencing, etc.
3. Centralised Data Management: Networks enable centralised data storage and
management, making it easier to back up, retrieve, and secure data.
4. Cost Efficiency: By sharing resources and infrastructure, networks can reduce
hardware and software costs for organisations.
5. Scalability: Networks can easily scale to accommodate growing numbers of users
and devices by adding or upgrading network components.
6. Improved Flexibility: Networks allow users to access data and applications from
anywhere, using any device connected to the network, providing greater flexibility
and mobility.
7. Enhanced Security: Networks can implement security measures such as firewalls,
encryption, and access controls to protect data and systems from unauthorised
access and cyber threats.
(b) Working of Ring Topology: In a ring topology, all devices in the network are connected
in a closed loop or ring configuration. Each device in the network is connected to exactly two
other devices, forming a continuous pathway for data transmission. Data travels around the
ring in one direction, passing through each device until it reaches its destination.
Working Steps:
1. Data Transmission: When a device wants to send data to another device, it adds
the data onto the network in the form of a signal.
2. Passing through Nodes: The data signal travels around the ring, passing through
each device in the network.
3. Destination Reached: Eventually, the data signal reaches its destination device,
which processes the data.
4. Feedback Signal: After processing, the destination device may send a feedback
signal back around the ring to confirm receipt of the data.
● Equal Access: Each device in the network has equal access to the network's
resources, as there is no central node controlling access.
● No Collisions: Since data travels in only one direction around the ring, there are no
collisions between data packets.
● Simple Design: Ring topology is relatively simple to design and implement,
especially in small networks.
● Fault Isolation: If a single device or cable in the ring fails, it does not affect the rest
of the network, as data can still travel in the opposite direction.
(c) Apache Server Setting in Linux: Setting up an Apache web server on Linux involves
several steps:
1. Installation: Install the Apache package using the package manager of your Linux
distribution. For example, on Ubuntu, you can use the following command:
bash
Start the Apache Service: After installation, start the Apache service using the following
command:
bash
sudo systemctl start apache2
Enable Autostart: To ensure that Apache starts automatically at boot time, enable the
Apache service:
bash
sudo systemctl enable apache2
1.
2. Basic Configuration: Apache's main configuration file is usually located at
/etc/apache2/apache2.conf. You can customize settings such as server name,
port, and document root in this file.
3. Virtual Hosts: Apache allows you to host multiple websites on the same server using
virtual hosts. Configuration files for virtual hosts are typically stored in the
/etc/apache2/sites-available/ directory. You can create a new virtual host
configuration file for each website you want to host and enable them using the
a2ensite command.
4. Firewall Configuration: If you have a firewall enabled on your Linux server, you may
need to open the necessary ports (usually 80 for HTTP and 443 for HTTPS) to allow
incoming web traffic.
5. Testing: Once Apache is configured, you can test if it's working by accessing your
server's IP address or domain name in a web browser. You should see the default
Apache welcome page if everything is set up correctly.
These steps provide a basic overview of setting up an Apache web server on Linux.
Depending on your specific requirements and configuration, additional steps such as
SSL/TLS certificate installation, security hardening, and performance tuning may be
necessary.
Q4
(a) Explain the different user authentication methods. Differentiate symmetric and
asymmetric cryptography.
(b) Explain the Computer-Security Classification in detail.
Ans:-
(a) User Authentication Methods: User authentication is the process of verifying the
identity of a user who is trying to access a system or application. Different authentication
methods include:
● Symmetric Cryptography: Uses the same key for both encryption and decryption.
It's faster and more efficient but requires secure key distribution.
● Asymmetric Cryptography: Uses a pair of keys (public and private) for encryption
and decryption. It's slower but eliminates the need for secure key exchange. Public
keys are shared openly, while private keys are kept secret.
Q5
Write short notes on the following( i have to write in exams so i can score max)
(a) Serial Processing
(b) System calls
(c) Virtual Machines
(d) Wide Area Network
(e) Virtual Private Network.
Ans:-
(a) Serial Processing: Serial processing refers to executing tasks one after the other,
sequentially. It's a traditional computing model where instructions are processed in order,
without parallelism. It's simple but can lead to longer processing times.
(b) System Calls: System calls are interfaces provided by the operating system that allow
user-level processes to request services from the kernel. They provide a way for applications
to interact with hardware and perform privileged operations like file I/O, process
management, and networking.
(d) Wide Area Network (WAN): A Wide Area Network (WAN) is a network that spans a
large geographical area, connecting multiple local area networks (LANs) or other WANs. It
uses routers and public or private telecommunications links to transmit data between
different locations.
(e) Virtual Private Network (VPN): A Virtual Private Network (VPN) is a secure network
connection that extends a private network across a public network like the internet. It
enables users to securely access and transmit data over an encrypted connection,
protecting their privacy and security. VPNs are commonly used for remote access, secure
communication, and bypassing geographical restrictions.
JUNE 2023
Q1
(a) Define WINDOWS NT Registry. What does it consist of? Discuss how you can
secure the Registry and audit its critical components.
(b) Define a firewall. What are its functions? List its limitations.
(c) In context to RAID, explain Mirroring, Duplexing and Striping with parity.
(d) Discuss the file system in Windows-XP and also explain how the office file
features in Windows-XP are enabled?
(e) Discuss the absolute and relative pathnames in LINUX with the help of suitable
examples for each.
Ans:-
● Access Control Lists (ACLs): Assign appropriate permissions to registry keys and
values to restrict access to authorised users or groups.
● Registry Auditing: Enable auditing policies to monitor and track changes made to
critical components of the registry, such as sensitive system settings or
security-related keys.
● Registry Backup: Regularly backup the registry to restore it in case of accidental
deletion or corruption.
● Encryption: Encrypt sensitive registry data to protect it from unauthorised access.
Auditing Critical Components: To audit critical components of the Registry, you can
enable auditing policies using the Group Policy Editor or Security Configuration and Analysis
tool. Define audit policies to monitor key activities such as changes to registry keys and
values, access attempts, and modifications made by specific users or groups. Regularly
review audit logs to identify and investigate suspicious or unauthorised activities.
(b) Firewall: A firewall is a network security device or software that monitors and controls
incoming and outgoing network traffic based on predetermined security rules. Its primary
functions include:
● Packet Filtering: Examining packets of data entering or leaving the network and
allowing or blocking them based on predefined rules.
● Stateful Inspection: Tracking the state of active connections and allowing only
legitimate traffic that corresponds to established connections.
● Network Address Translation (NAT): Hiding internal network addresses by
translating them to a single public IP address, thus enhancing security and privacy.
● Application Layer Filtering: Analysing data packets at the application layer to filter
out malicious content or unauthorised applications.
Limitations of Firewalls:
● Mirroring (RAID 1): Mirroring involves creating an exact copy (mirror) of data onto
another disk in real-time. This provides redundancy and fault tolerance, as data
remains accessible even if one disk fails.
● Duplexing: Duplexing is similar to mirroring but involves two separate controllers
and paths for each disk. It provides higher fault tolerance and performance compared
to mirroring.
● Striping with Parity (RAID 5): Striping with parity distributes data across multiple
disks along with parity information, which is used for error detection and recovery.
This provides fault tolerance and improved performance by distributing data and
parity information across multiple disks.
(d) File System in Windows XP: Windows XP primarily uses the NTFS (New Technology
File System) as its default file system, which provides features such as file-level security,
encryption, compression, and disk quotas. NTFS offers improved reliability, scalability, and
performance compared to the older FAT (File Allocation Table) file systems.
Office File Features in Windows XP: Office file features in Windows XP are enabled by
installing Microsoft Office applications such as Microsoft Word, Excel, PowerPoint, etc.
These applications provide features such as document creation, editing, formatting, and
collaboration. Office files can be saved and accessed using the file system provided by the
operating system (e.g., NTFS).
These examples illustrate how absolute and relative pathnames are used to navigate the file
system in Linux.
Q2
(a) Describe the file and directory systems of LINUX with suitable examples.
(b) Describe various file permission modes in LINUX and associated commands for
granting/revoking file permissions.
(c) Explain the purpose of the following commands in LINUX with an example for
each:
(i) cp (ii) mv
Ans :-
(a) File and Directory Systems of Linux: Linux uses a hierarchical file system that
organises files and directories in a tree-like structure. The root directory ("/") is the top-level
directory from which all other directories and files stem. Here are some key directories in
Linux and their purposes:
● /bin: Contains essential binary files and commands required for system booting and
basic system functionality.
● /etc: Stores system configuration files and scripts.
● /home: Home directories for user accounts are typically located here.
● /var: Contains variable data files, such as logs, mail, and print spools.
● /tmp: Temporary files are stored here. These files are typically deleted upon system
reboot.
● /usr: Contains user binaries, libraries, documentation, and source code.
● /dev: Contains device files representing physical and virtual devices.
● /proc: A virtual filesystem that provides information about processes and system
resources.
Example: To create a directory named "documents" in the current directory, you can use the
following command:
bash
mkdir documents
(b) File Permission Modes in Linux: Linux uses three types of permissions: read (r), write
(w), and execute (x). These permissions can be set for three categories of users: owner,
group, and others. Here are the various permission modes:
Example: To grant read and write permissions to the owner, and only read permission to the
group and others for a file named "example.txt", you can use the following command:
bash
chmod 644 example.txt
(c) Purpose of Commands in Linux: (i) cp (Copy): Copies files or directories from one
location to another. Example: To copy a file named "file1.txt" from the current directory to a
directory named "backup", you can use the following command:
bash
cp file1.txt backup/
(ii) mv (Move): Moves files or directories from one location to another or renames them.
Example: To move a file named "file1.txt" from the current directory to a directory named
"archive", you can use the following command:
bash
mv file1.txt archive/
These commands are fundamental for managing files and directories in Linux systems.
Q3
(a) Differentiate the role and responsibilities of "user mode" and "kernel mode" of
Windows-2000 systems.
(b) What is Kerberos? Explain the complete process of client authentication through
Kerberos.
c) What is a Virtual Private Network (VPN)? Describe the step by step procedure to
configure VPN in Windows-XP.
Ans :-
User Mode:
Kernel Mode:
● Responsibilities: Kernel mode has full access to system resources and controls the
hardware. It manages system memory, CPU scheduling, device drivers, and other
core operating system functions.
● Access: Kernel mode has unrestricted access to system memory and hardware
resources, allowing it to perform privileged operations.
● Privileged Instructions: Kernel mode can execute privileged CPU instructions that
are not available in user mode.
● Examples: Device drivers, the memory manager, and the process scheduler run in
kernel mode.
(c) Virtual Private Network (VPN): A Virtual Private Network (VPN) is a secure network
connection that allows users to access a private network over a public network such as the
internet. It encrypts data transmitted between the user's device and the VPN server,
ensuring confidentiality and security.
Once connected, you will have access to the private network resources securely through the
VPN tunnel.
Q4
(a) Differentiate LAN, MAN and WAN in context of its geographical distribution, size,
access mechanism, hardware devices and communication.
Ans :-
(a) Differentiation of LAN, MAN, and WAN:
(i) NTFS (New Technology File System): NTFS is the primary file system used by
Windows 2000 and subsequent Windows operating systems. It offers several advantages
over the older FAT file system, including:
(ii) EFS Services (Encrypting File System): EFS is a feature of NTFS that provides
file-level encryption for data security and confidentiality. It encrypts files and folders using
cryptographic algorithms, making them unreadable without the appropriate decryption key.
Key features of EFS include:
● Seamless integration with Windows Explorer for easy encryption and decryption of
files and folders
● Support for multiple encryption algorithms, including RSA and DESX
● Granular control over encryption settings, including recovery agents and
certificate-based encryption
● Integration with Active Directory for centralised management of encryption policies
and keys
Overall, NTFS and EFS are essential features of Windows 2000 that provide enhanced file
system capabilities and data security for users and organisations.
Q5
Write short notes on the following:
Ans :-
(a) Gateways Network Device: A gateway is a network device that connects two or more
disparate networks, allowing them to communicate and exchange data. It acts as an entry
and exit point for data traffic between networks with different protocols, addressing schemes,
or communication standards. Gateways operate at the network layer (Layer 3) of the OSI
model and perform protocol translation, data encapsulation, and routing functions. They
enable seamless connectivity and interoperability between networks of varying types, such
as local area networks (LANs), wide area networks (WANs), and the internet.
(b) Backup and Restoration in Linux: Backup and restoration in Linux involves the
process of creating copies of data files and system configurations to safeguard against data
loss, corruption, or system failure. Key components of backup and restoration in Linux
include:
● Backup Utilities: Linux provides various backup utilities such as tar, rsync, and
dump for creating backups of files and directories.
● Backup Storage: Backups can be stored on local storage devices (e.g., hard drives,
USB drives) or remote servers using network protocols like SSH, FTP, or NFS.
● Backup Strategies: Backup strategies include full backups (copying all data),
incremental backups (copying only changed data since the last backup), and
differential backups (copying changed data since the last full backup).
● Restoration Process: To restore data from backups, users can use the appropriate
backup utility to extract files and directories from backup archives to their original
locations.
(c) Distributed Operating System: A distributed operating system is a software system that
manages resources and provides services across multiple networked computers. Key
characteristics of distributed operating systems include:
(d) Managing User Profiles in Windows 2000: Managing user profiles in Windows 2000
involves configuring and customising user settings and preferences for individual users or
groups of users. Key aspects of managing user profiles in Windows 2000 include:
● User Profile Creation: User profiles are automatically created when users log in to a
Windows 2000 system for the first time. Profiles store user-specific settings such as
desktop customization, application preferences, and network connections.
● Profile Types: Windows 2000 supports two types of user profiles: local profiles
stored on the local machine and roaming profiles stored on a network server.
Roaming profiles allow users to access their settings from any computer in the
network.
● Profile Management: Administrators can manage user profiles using tools such as
the User Profiles applet in the Control Panel or Group Policy settings. They can
configure profile properties, permissions, and deletion policies to ensure efficient use
of system resources and data security.
● Profile Migration: Windows 2000 provides tools and utilities for migrating user
profiles between computers or domains, allowing seamless transition of user settings
and preferences during system upgrades or migrations.
These short notes provide an overview of gateways, backup and restoration in Linux,
distributed operating systems, and managing user profiles in Windows 2000.
DEC 2022
Q1
(a) Discuss Pipes, Filters and Redirection commands in LINUX, along with suitable
examples and explanations.
(d) Define authentication tokens. With reference to authentication tokens, explain the
use of Hardware tokens and Software tokens.
Ans:-
(a) Pipes, Filters, and Redirection in Linux:
Pipes: Pipes allow the output of one command to be used as the input for another
command. The pipe operator (|) is used to connect multiple commands together. For
example:
bash
ls | grep "file"
This command lists files in the current directory and passes the output to the grep command
to search for files containing "file" in their names.
Filters: Filters are commands that process input data and produce output based on specific
criteria. They are commonly used in combination with pipes to manipulate text or data.
Examples of filters include grep, sed, and awk. For example:
bash
cat file.txt | grep "keyword"
This command reads the contents of a file named file.txt and filters lines containing the
keyword "keyword".
Redirection: Redirection is used to control the input and output of commands. The greater
than (>) and less than (<) symbols are used for output and input redirection, respectively. For
example:
bash
ls > files.txt
This command lists files in the current directory and redirects the output to a file named
files.txt.
(i) TCP/IP Protocol Settings: In Windows XP, TCP/IP protocol settings are configured
through the Internet Protocol (TCP/IP) properties dialog. Users can specify IP addresses,
subnet masks, default gateways, and DNS server addresses manually or obtain them
automatically through DHCP. This configuration is essential for network communication and
internet connectivity.
(ii) VPN and Remote Networking Facilities: Windows XP includes built-in support for
Virtual Private Network (VPN) connections and remote networking facilities. Users can
establish secure VPN connections to remote networks over the internet using protocols such
as PPTP (Point-to-Point Tunneling Protocol) or L2TP/IPsec (Layer 2 Tunneling
Protocol/Internet Protocol Security). Remote Desktop Connection allows users to access
and control remote computers over a network connection.
(i) Integrity: Integrity ensures that data remains accurate, complete, and unaltered
throughout its lifecycle. It involves protecting data from unauthorized modification, deletion,
or corruption. Methods such as checksums, digital signatures, and access controls are used
to maintain data integrity.
(iii) Availability: Availability ensures that data and resources are accessible and usable
when needed by authorized users. It involves protecting against disruptions, downtime, or
denial of service attacks. Redundancy, fault tolerance, and disaster recovery plans are used
to maintain availability.
Authentication tokens are physical or digital devices used to verify a user's identity during the
authentication process. They provide a secure way to authenticate users without relying
solely on passwords.
Hardware Tokens: Hardware tokens are physical devices that generate one-time
passwords (OTPs) or cryptographic keys. Users must possess the token and enter the
generated OTP to authenticate. Examples include RSA SecurID tokens and YubiKeys.
Software Tokens: Software tokens are digital tokens generated and stored on a user's
device, such as a smartphone or computer. They can be used for two-factor authentication
(2FA) or multi-factor authentication (MFA) alongside passwords. Examples include Google
Authenticator and Microsoft Authenticator.
TFTP: TFTP is a simple file transfer protocol used for transferring files between networked
devices. It operates on UDP port 69 and does not require authentication, making it suitable
for booting devices over a network or transferring configuration files between network
devices in a controlled environment.
TELNET: TELNET is a network protocol used for remote terminal access and control. It
allows users to log in to remote computers or networking devices over a network connection
and execute commands as if they were physically present at the remote console. TELNET
operates on TCP port 23 and transmits data in plain text, making it vulnerable to interception
and eavesdropping.
Q2
(a) Explain the features of Network Operating System and Distributed
Operating System.
(b) Define Domain Name System (DNS). In context to DNS, explain DNS
Architecture Zones.
Ans:-
(a) Features of Network Operating System (NOS) and Distributed Operating System
(DOS):
● Resource Sharing: DOS enables the sharing of resources and services across
multiple interconnected computers in a distributed environment.
● Transparency: It provides transparency to users and applications regarding the
distribution of resources, hiding the complexities of the underlying network
infrastructure.
● Concurrency: DOS supports concurrent execution of processes and threads across
distributed nodes, enabling parallel processing and improved system performance.
● Fault Tolerance: DOS incorporates fault-tolerant mechanisms to ensure system
reliability and availability in the event of node failures or network disruptions.
● Definition: DNS architecture zones are logical divisions of the DNS namespace that
define administrative boundaries and delegation of authority within the DNS
hierarchy.
● Types of Zones: Common types of DNS zones include:
○ Forward Lookup Zone: Maps domain names to IP addresses, enabling
hostname resolution.
○ Reverse Lookup Zone: Maps IP addresses to domain names, facilitating
reverse hostname resolution.
○ Primary Zone: The primary source of zone data that is authoritative for the
zone and can be updated directly.
○ Secondary Zone: A read-only copy of zone data obtained from a primary
zone, providing fault tolerance and load distribution.
Q3
(a) Discuss process and thread management in LINUX.
(b) Discuss the file system, special files and file management in LINUX.
Ans :-
(a) Process and Thread Management in Linux:
● File System: Linux uses a hierarchical file system structure, with the root directory
("/") at the top. Common file systems in Linux include ext4, XFS, and Btrfs, offering
features such as journaling, file permissions, and file attributes.
● Special Files: Special files in Linux include device files (/dev), symbolic links, and
named pipes (FIFOs). Device files represent physical and virtual devices, symbolic
links are pointers to other files or directories, and named pipes facilitate inter-process
communication.
● File Management: Linux provides commands such as ls (list files), cp (copy files),
mv (move files), and rm (remove files) for file management. Users can create, modify,
and delete files and directories using these commands, as well as set file
permissions and ownership using chmod and chown commands.
Q4
(a) Discuss the following (giving an example for each) with reference to shell scripting
in LINUX:
(i) variables
(b) Briefly discuss the following network connecting devices, mentioning their
purpose, operating layer and working principle:
(i) Repeaters
(ii) Hubs
(iii) Bridges
(iv) Routers
Ans:-
(i) Variables:
● Definition: Variables in shell scripting are used to store data temporarily for later
use.
● Example:
bash
#!/bin/bash
name="John"
echo "Hello, $name!"
In this example, the variable "name" stores the value "John", which is then used in the echo
command to print "Hello, John!".
● Definition: The if... else statement in shell scripting is used to make decisions based
on conditions.
● Example:
bash
#!/bin/bash
age=20
if [ $age -ge 18 ]; then
echo "You are an adult."
else
echo "You are a minor."
fi
In this example, if the variable "age" is greater than or equal to 18, it prints "You are an
adult."; otherwise, it prints "You are a minor.".
● Definition: The echo command in shell scripting is used to display text or variables
on the terminal.
● Example:
bash
#!/bin/bash
echo "Hello, World!"
In this example, the echo command prints "Hello, World!" on the terminal.
● break: The break statement in shell scripting is used to exit from a loop prematurely.
● continue: The continue statement in shell scripting is used to skip the current
iteration of a loop and continue with the next iteration.
● Example:
bash
#!/bin/bash
for i in {1..5}; do
if [ $i -eq 3 ]; then
break
fi
echo $i
done
In this example, the loop prints numbers from 1 to 5, but it breaks out of the loop when the
value of "i" is equal to 3.
(i) Repeaters:
(ii) Hubs:
● Purpose: Hubs connect multiple network devices within a single network segment,
allowing them to communicate with each other.
● Operating Layer: Physical layer (Layer 1) of the OSI model.
● Working Principle: Hubs receive data packets from connected devices and
broadcast them to all other devices within the network segment.
(iii) Bridges:
● Purpose: Bridges connect multiple network segments and forward traffic between
them to reduce network congestion and improve performance.
● Operating Layer: Data link layer (Layer 2) of the OSI model.
● Working Principle: Bridges analyze incoming data packets' destination MAC
addresses and forward them only to the appropriate segment if the destination is on
a different segment.
(iv) Routers:
● Purpose: Routers connect multiple networks together and forward data packets
between them based on destination IP addresses.
● Operating Layer: Network layer (Layer 3) of the OSI model.
● Working Principle: Routers examine destination IP addresses in data packets,
determine the best path for forwarding based on routing tables, and forward packets
accordingly to their destination networks.
Q5
(a) SNMP and UDP
Ans:-
● Linux utilities are command-line tools and programs available in the Linux operating
system that perform various tasks and functions. These utilities range from basic
system administration tasks to advanced network management and troubleshooting
tools. Examples include ls (list directory contents), cp (copy files), mv (move files),
grep (search text patterns), and ssh (secure shell).
● Linux provides several tools and methods for user-to-user communication, including:
○ Talk and write: Command-line utilities for real-time text-based
communication between users on the same system.
○ Wall: Broadcast messages to all users logged in to the system.
○ Messaging applications: Graphical applications like Empathy, Pidgin, and
Telegram for instant messaging and chat.
○ Email: Command-line utilities like mail and mutt, as well as graphical email
clients like Thunderbird, for sending and receiving emails.
● RAID: RAID is a data storage technology that combines multiple physical disk drives
into a single logical unit to improve data performance, reliability, or both. RAID
configurations are categorised into several levels (e.g., RAID 0, RAID 1, RAID 5,
RAID 10), each offering different levels of performance, redundancy, and data
protection.
● Implementation: RAID can be implemented using hardware RAID controllers or
software RAID configurations within the operating system. Hardware RAID requires
dedicated RAID controller cards, while software RAID relies on the operating
system's built-in functionality to manage RAID arrays. RAID arrays can be configured
and managed using utilities like mdadm in Linux, allowing users to create, modify,
and monitor RAID configurations to suit their specific requirements.
JUNE 2022
Q1
(a) Explain the output of the following Linux/Unix commands:
(i) date who
(ii) diff abc.txt xyz.txt
(iii) man who
(iv) ls-a
(v) pwd
Ans :-
● This command compares the contents of the two files abc.txt and xyz.txt.
● It outputs the differences between the two files in a format that shows which
lines need to be changed in each file to make them identical.
● This command opens the manual page for the who command.
● It provides detailed information about the usage, options, and descriptions of
the who command.
(iv) ls-a:
(v) pwd:
Ans:-
Filters:
● Filters are commands that take input, process it, and produce output. They can
be used to manipulate and transform data.
● Example: grep "error" logfile.txt - This command filters out all the lines
in logfile.txt that contain the word "error".
Pipelines:
● Pipelines use the pipe operator (|) to pass the output of one command as input
to another command, creating a chain of processes.
● Example: ls -l | grep "^d" - This command lists all directories in the
current directory by passing the long format list (ls -l) output to grep, which
filters lines that start with "d" (indicating directories).
(c) What is the default location of print spooler in Windows NT? Name the different
permissions that can be set for printers in Windows NT. Explain the significance of
each.
Ans :-
Ans :-
Disk Striping: Disk striping is a method of dividing data across multiple disk drives to
improve performance. Each stripe is written to a different disk in parallel, increasing
read and write speeds.
Limitations:
RAID Levels:
(e) Describe the structure and characteristics of any two types of guided
transmission media.
Ans :-
Coaxial Cable:
Ans :-
● End devices that convert user information into signals for transmission or
reconvert the received signals into user information.
● Example: Computers, terminals.
(g) What is VPN? Write the purpose of VPN and name the VPN technologies
supported by Windows 2000.
Ans :-
VPN: A VPN extends a private network across a public network, allowing users to
send and receive data as if their computing devices were directly connected to the
private network.
Purpose: Ensures secure, encrypted connections over the internet, protecting data
from eavesdropping and enhancing privacy.
VPN Technologies in Windows 2000:
Ans :-
● Components:
○ Managed Devices: Network nodes that contain SNMP agents.
○ Agents: Software on managed devices that collects and stores
management information.
○ Network Management System (NMS): Software that runs on a manager
device to control and monitor managed devices.
○ MIB (Management Information Base): Database of network management
information maintained by the agent.
● Diagram:
NMS (Manager)
|
| SNMP Protocol
|
Managed Device
|
Agent
|
MIB
● Explanation:
○ The NMS sends queries and commands to agents.
○ Agents collect data from the MIB and respond to NMS.
○ The NMS can also set parameters on managed devices through agents.
Ans:-
Here's a shell script that replaces all numeric digits in a given text file with "*":
Bash
#!/bin/bash
Explanation:
1. Shebang (#!/bin/bash): Specifies the script should be run in the bash shell.
2. Check if file path is provided: The script checks if the user has given the file path
as an argument. If not, it prints the usage and exits.
3. Get the file path: The script assigns the first argument to the FILE_PATH variable.
4. Check if the file exists: It checks if the file exists at the specified path. If not, it prints
an error message and exits.
5. Use sed to replace digits: The script uses the sed command to find and replace all
numeric digits ([0-9]) with *. The -i option edits the file in place.
6. Notify the user: After the operation, the script prints a message to inform the user
that the digits have been replaced.
(b) Compare multiprogramming and multitasking. Give suitable examples for each.
Ans:-
Multiprogramming:
Multitasking:
Summary of Differences:
● Objective:
○ Multiprogramming: Maximise CPU utilisation.
○ Multitasking: Provide responsive interactive systems.
● Context Switching:
○ Multiprogramming: Less frequent, as switching occurs mainly due to I/O
wait.
○ Multitasking: Frequent, as the CPU switches between tasks rapidly to
ensure concurrent execution.
● Execution:
○ Multiprogramming: Sequential program execution.
○ Multitasking: Simultaneous task execution.
● Example Systems:
○ Multiprogramming: Mainframe batch processing systems.
○ Multitasking: Modern personal computers and smartphones.
Ans :-
1. Bus Topology:
2. Star Topology:
3. Ring Topology:
4. Mesh Topology:
5. Tree Topology:
(b) With reference to security system and facilities, explain the following :
(i) System Access Control
(ii) Data backup and off-site retention
Ans :-
● Description: Data backup and off-site retention involve creating copies of data
and storing them at a different location to protect against data loss due to
system failures, natural disasters, or other catastrophic events.
● Components:
○ Data Backup: Regularly copying data to a secondary storage medium
(such as external hard drives, tape drives, or cloud storage). Types of
backups include full, incremental, and differential backups.
○ Off-site Retention: Storing backup copies at a different physical location
from the primary site to ensure data availability in case of site-specific
disasters.
● Significance:
○ Data Recovery: Ensures that data can be restored in the event of
corruption, accidental deletion, or hardware failure.
○ Disaster Recovery: Provides a means to recover critical business
functions and data after a major disaster, minimising downtime and data
loss.
○ Compliance: Helps organisations meet regulatory requirements for data
protection and retention.
Ans :-
User Mode:
Kernel Mode:
Diagram:
sql
Copy code
+--------------------------+
| User Mode |
| +----------------------+ |
| | Applications | |
| +----------------------+ |
| ^ |
| | |
| System Calls |
| | |
+---------v----------------+
| Kernel Mode |
| +----------------------+ |
| | Kernel | |
| +----------------------+ |
+--------------------------+
(b) Explain the process and thread management in Linux Operating System
Ans :-
Process Management:
● Process Creation:
○ fork(): Creates a new process by duplicating the calling process. The
new process, called the child, is an exact copy of the parent process
except for the returned value.
○ exec(): Replaces the current process image with a new process image.
This is used after fork() to run a different program in the child process.
○ exit(): Terminates a process and returns an exit status to the parent
process.
○ wait(): Makes a parent process wait until all of its child processes have
terminated.
● Process States:
○ Running: The process is either running or ready to run.
○ Waiting: The process is waiting for some event to occur (e.g., I/O
completion).
○ Stopped: The process is stopped, usually by receiving a signal.
○ Zombie: The process has terminated, but its parent has not yet called
wait(), leaving an entry in the process table.
● Scheduling:
○ Scheduler: The Linux scheduler manages process execution, using
algorithms like Completely Fair Scheduler (CFS) for fair distribution of
CPU time among processes.
○ Priorities: Processes are assigned priorities, and the scheduler selects
processes based on these priorities.
Thread Management:
● Processes: Have their own memory space; more heavyweight due to the need
for more context information during context switches.
● Threads: Share the same memory space within a process; lightweight and
faster to create and manage.
Diagram:
Copy code
+------------------------+
| Process |
| +--------------------+ |
| | Thread 1 | |
| | Shared Resources | |
| +--------------------+ |
| +--------------------+ |
| | Thread 2 | |
| | Shared Resources | |
| +--------------------+ |
+------------------------+
a) Microkernel Architecture
Ans:-
Microkernel Architecture:
Ans :-
● Full Backup:
○ Definition: Copies all data to the backup medium.
○ Advantage: Simple restoration process since all data is contained in a
single backup set.
○ Disadvantage: Time-consuming and requires significant storage space.
● Incremental Backup:
○ Definition: Copies only the data that has changed since the last backup
(either full or incremental).
○ Advantage: Faster and requires less storage space than full backups.
○ Disadvantage: Restoration can be complex and time-consuming, as it
involves the last full backup and all subsequent incremental backups.
● Differential Backup:
○ Definition: Copies all data that has changed since the last full backup.
○ Advantage: Faster than full backups and simpler to restore than
incremental backups.
○ Disadvantage: Requires more storage space than incremental backups
as it duplicates changes since the last full backup.
● Mirror Backup:
○ Definition: An exact copy of the source data.
○ Advantage: Immediate access to the data as it is a direct replica.
○ Disadvantage: High storage requirement and does not retain historical
versions of the data.
Ans :-