Mcs 022 Block 2 3 4 Exam Notes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

 Memory Management in Linux - Linux memory management subsystem is

responsible, as the name implies, for managing the memory in the system.
This includes implementation of virtual memory and demand paging,
memory allocation both for kernel internal structures and user space
programs, mapping of files into processes address space and many other
cool things. Linux memory management is a complex system with many
configurable settings.

 Group Policy is a feature of the Microsoft Windows NT family of operating


systems that controls the working environment of user accounts and
computer accounts. Group Policy provides centralized management and
configuration of operating systems, applications, and users' settings in an
Active Directory environment. Microsoft's Group Policy Object (GPO) is a
collection of Group Policy settings that defines what a system will look like
and how it will behave for a defined group of users. Microsoft provides a
program snap-in that allows you to use the Group Policy Management
Console.

3. To set the IP address within Windows XP and Windows 2000, complete


these steps.
 Click Start > Control Panel.
 On the control panel, double-click Network Connections.
 Right-click Local Area Connection.
 Click Properties.
 Select Internet Protocol (TCP/IP), and then click Properties.
 Select Use the Following IP Address.
 Complete the IP address, Subnet mask, and Default gateway fields by
using the values in step 4 from accessing the ASMI using a Web Browser.
 Click OK on the Local Area Connection Properties window. It is not
necessary to restart your PC.

4. Pipes- A pipeline is a mechanism for inter-process communication using


message passing. A pipeline is a set of processes chained together by their
standard streams, so that the output text of each process (stdout) is passed
directly as input (stdin) to the next one.

Filter - Filters are programs that take plain text (either stored in a file or
produced by another program) as standard input, transforms it into a
meaningful format, and then returns it as standard output. Linux has a
number of filters.

5. A process is a program under execution i.e an active program. A thread is a


lightweight process that can be managed independently by a scheduler.
Processes require more time for context switching as they are heavier.
Threads require less time for context switching as they are lighter than
processes.

6. Network vulnerabilities come in many forms but the most common types
are: Malware, short for malicious software, such as Trojans, viruses, and
worms that are installed on a user's machine or a host server. Social
engineering attacks that fool users into giving up personal information such
as a username or password.
A computer threat is a term that relates to the security of a computer system
being compromised. This threat can lead to cyber-attacks and data being
stolen, lost or edited. The threat could be caused by poor information security
practices or a 'backdoor' in the code of the system.

7. A Firewall is a network security device that monitors and filters incoming


and outgoing network traffic based on an organization's previously
established security policies. At its most basic, a firewall is essentially the
barrier that sits between a private internal network and the public Internet.

8. Packet filtering is the process of passing or blocking packets at a network


interface based on source and destination addresses, ports, or protocols.
Packet filters act on the source and destination IP and port addresses that are
present in each TCP/IP packet. You can set rules allowing access to only
familiar and established IP addresses and denying access to all unknown or
unrecognized IP addresses.

9. An Intrusion Detection System (IDS) is a monitoring system that detects


suspicious activities and generates alerts when they are detected. An
intrusion detection system is a device or software application that monitors a
network or systems for malicious activity or policy violations. Any intrusion
activity or violation is typically reported either to an administrator or
collected centrally using a security information and event management
system.

10. A primary DC is the first-line domain controller that handles user-


authentication requests. Only one primary DC can be designated. According to
security and reliability best practices, the server housing the primary DC
should be solely dedicated to domain services. The Primary Domain
Controller maintains the master copy of the directory database and validates
users. A Backup Domain Controller contains a copy of the directory database
and can validate users. If the PDC fails then a BDC can be promoted to a PDC.

11. Internet Protocol Security is a secure network protocol suite that


authenticates and encrypts packets of data to provide secure encrypted
communication between two computers over an Internet Protocol network. It
is used in virtual private networks. IPsec is used for protecting sensitive data,
such as financial transactions, medical records and corporate
communications, as it's transmitted across the network. It's also used to
secure virtual private networks (VPNs), where IPsec tunneling encrypts all
data sent between two endpoints.
12. The Encrypting File System on Microsoft Windows is a feature introduced
in version 3.0 of NTFS that provides filesystem-level encryption. The
technology enables files to be transparently encrypted to protect confidential
data from attackers with physical access to the computer. EFS is a user-based
encryption control technique that enables users to control who can read the
files on their system. The typical method of using EFS is to perform encryption
at the folder level. This ensures that all files added to the encrypted folder are
automatically encrypted.

You might also like