Mbanotes.de

Mba Notes , Assignments , Books , Projects

Saturday, 05 December 2015 10:57

Operating System Concepts and Networking Management

Written by
Rate this item
(0 votes)

Operating System Concepts and Networking Management

  

(1) What are the Goals of Computer Security'?

(2) Justifj, the following statement.  There is no confidentiality without integrity"

(3) ldenitify computer assets in your organisation.

(4) Identify threats to assets listed in progress 1 above.

(5) Identify the impact of security attack listed in 2 above.

(6) Distinguish between vulnerability and threat.

(7) List any three recent computer security failures.

(8) Do you currently apply any computer security control measures? If so,what?Against what  attacks are you trying to protect?

(9) Discuss various security systems and facilities.

(10) What is computer-security classification?

(11) What do you understand by symmetric and asymmetric cryptography?

(12)  Give the default order of group policy implementation through Active Directory service hierarchy.

(13) Is it possible to set up encryption on a compressed folder?

(14) When should security groups be used instead of distribution groups?

(15) If the domain mode is switched over from mixed mode to native mode, what are the   implications?

(16) If a remote access client wants to connect to RAS server but connection is not allowed how         will this error be solved?

(17) Write the purpose of VPN and name VPN technologies supported by Windows 2000?

(18) What is the purpose of a directory service in Windows 2000?

(19) In what mode does the console run?

(20) How does a domain differ from a workgroup?

(21) In a multi-user environment while printing, how can the possibility of a user ending up with a       wrong document be avoided?

(22) Can a single document be redirected on a network?

(23) When do DCHP clients try to renew their leases?

(24) Can moving and copying files and folders between disk volumes change their compression   state?

(25) What type of data is replicated by FRS?

(26) What is the default permission when a partition is formulated with NIFS?

(27) Name various methods of authentication available in windows operating system.

(28) Describe kerberos management in windows operating system.

(29) Describe policy inheritance.

(30) What do you understand by VPN? Discuss IPSec security ?

(31)  Discuss in detail EFS (Encrypting File System) ?

(32) What do you understand by a null session? How null session can be disabled?

(33) List the steps for disabling the Last username option.?

(34) What are limitations ofthe domain model?

(35) What do you understand by PDC and BDC?

(36)  What is Active Directory?

(37) How will you secure guest account?

(38) What do you understand by Windows 2000 DNS?

(39) What are the Goals of Computer Security'?

(40) Justifj, the following statement:  There is no confidentiality without integrity?

(41) ldentify computer assets in your organisation.?

(42) Identify threats to assets listed in progress 1 above.?

(43) Identify the impact of security attack listed in 2 above.?

(44) Distinguish between vulnerability and threat.?

(45) List any three recent computer security failures.?

(46) Do you currently apply any computer security control measures? If so, what?Against what   attacks are you trying to protect?

(47) Discuss various security systems and facilities.?

(48) What is computer-security classification?

(49) What do you understand by symmetric and asymmetric cryptography?

(50) Find liow to force a file system consistency check.

(51) What happens if a user logs out after you have started writing to him?

 

Read 2897 times
Login to post comments
You are here: Home