Write the purpose of VPN and name the VPN technologies supported by Windows 2000.

Write the purpose of VPN and name the VPN technologies supported by Windows 2000.

Last Date of Submission : 15th October, 2018 (For July Session)
15th April, 2019 (For January Session)
This assignment has eight questions of 10 marks each. Answer all questions. Rest 20 marks are for viva voce.

see page 1

Question 1:
(a) Write the purpose of VPN and name the VPN technologies supported by Windows 2000. (5 Marks)

(b) List the main contents of Password files and where are they located in Windows? Also, explain the concept of Shadow passwords? (5 Marks)
Question 2:
(a) Compare the role and responsibilities of user mode and kernel mode of Windows 2000 system. (5 Marks)
(b) List the important components of domain name server. Also, explain how the domain name server is configured in LINUX operating system. (5 Marks)
Question 3:
Discuss the Users’ Administration in WINDOWS 2000. What are the different types of user groups supported by Windows 2000? Discuss the scope and limitations of each group. Also, list the tools available in Windows2000 for user management.
(10 Marks)
Question 4:
(a) Discuss the tasks performed by LinuxConf package. (5 Marks)
(b) Explain the advantages and disadvantages of different LAN topologies. (5 Marks)
Question 5:
(a) Explain the role and importance of following tools for quota management in
Linux:
• quotacheck
• repquota
• quota (6 Marks)
(b) Compare the security features/mechanism of Windows2000 and Linux operating systems. (4 Marks)
5
Question 6:
(a) Why is the audit view limited to specific users only in windows 2000? (5 Marks)
(b) Explain the purpose and features of registry management. Also, explain the uses of it. (5 Marks)
Question 7:
Write a shell script that searches the file contents in a directory and its sub-directories for a text string given by the user. It list all such file names having that given string and store in a temp file “example_dir” (10 Marks)
Question 8:
(a) What is backup? What are the strategies followed in Linux for backup? (5 Marks)
(b) What encryption function is used by Windows 2000 operating system? (5 Marks)

You may also like...

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

error: Content is protected !!