Saturday, 18 February 2017

Networking Management - How would you harden a windows 2000 system to reduce the vulnerability of a guest account



Assignment Solutions, Case study Answer sheets
Project Report and Thesis contact
www.mbacasestudyanswers.com
ARAVIND – 09901366442 – 09902787224



Networking Management




Note :


(i) Question number 1 is compulsory and carrries 40 marks


(ii) Attempt any three questions from the rest



1. (a)describe the auditing facilities of windows 2000. 5 marks



b)what steps can one take to enhance the physical security of a computer? 5 marks



(c)why is it important to disable the NULL session on a computer in a network ? how can you do this in windows 2000? 5 marks



(d)what is the general format of a linux command? How would you handle special characters in an argument to a command? 5marks 


(e) what are the advantages of llinux as an operating system over those of the Microsoft family? 5 marks


(f) how would you harden a windows 2000 system to reduce the vulnerability of a guest account? 5 marks


(g) how can a windows 2000 machine be assigned an IP address at startup? 5marks



(h) how does a thread differ from an operating system process? 5 marks



2.(a)describe the file transfer protocol (FTP) and the usage of the ftp utility. What are its security loopholes? 10 marks


(b) you have a file in linux on which you do not have write permission. If you do have write permission on the directory in which the file is located, how can you change the contents of the file? 6 marks


(c )what are the characteristics of the 7 RAID levels? 4 marks


3. (a)describe the working of he IPsec framework for private transmission over an IP network? 10 marks


(b)what are the standard input, standard output and standard error in linux? How are they used in pipelines and filters? 6 marks


(c )describe the cal command and its important options? 4 marks



4. (a)what is symmetric multiprocessing? Describe its architecture and benefits? 8marks


(b)how does one set up a domain in windows 2000? How are trust relationships between domains established? 4 marks


( c) how does the shadow password file enhance security in linux? 4marks


5. explain the following with suitable examples where needed. 20 marks


(i) Dynamic IP address allocation


(ii) Full, incremental and differential backup


(iii) We command in linux


(iv) Windows explorer




Assignment Solutions, Case study Answer sheets
Project Report and Thesis contact
ARAVIND – 09901366442 – 09902787224

No comments:

Post a Comment