You are on page 1of 3

Nirma University

Institute of Diploma Studies


Computer Engineering Department
Semester VI
System and Network Administration (1CEA14)     Year: 2011

Tutorial - 1
1 Explain in brief.
DACL, ACE
2 Explain SSPI in brief.
3 List the windows 2000 Security Protocols.
4 Explain any two security Technical requirements.
5 Draw the architecture of windows 2000.

Tutorial - 2
1 Define:
OU, Schema
2 State the Difference between Domain and Domain Controller.
3 Explain password policy for Multiple Domains.
4 In which situations, we are implementing the Single domain instead of
multiple domain.
5 In which situations, we are implementing the multiple forest instead of
a single forest.

Tutorial - 3
1 List different methods for Remote Access Connection.
2 The level of protection of EAP is low compare to MS-CHAPv2. (True /
False)
3 List the different VPN protocols.
4 Explain PPTP.
5 Write down the three major differences between L2TP and PPTP.

Tutorial - 4
1 Draw the Structure of a FAT Volume.
2 Write down the four differences between NTFS and FAT file system.
3 Explain CONVERT command with example.
4 Explain Sector.
5 Explain Cluster.

Tutorial - 5
1 RADIUS allows single sign-on capabilities to remote users by allowing
them to authenticate with the domain account and password. (True /
False)
2 Explain: (1) RADIUS server
3 Explain: (1) RADIUS access clients (2) RADIUS proxy.
4 Explain RADIUS authentication process for a VPN client.

Tutorial - 6
1 Explain NIS.
2 Explain Microsoft service for UNIX 2.0
3 Explain NFS software.
4 List the several authentication methods, when UNIX clients
authenticating with the windows 2000 network.
5 Explain providing access to UNIX resources by using a Gateway.

Tutorial - 7
1 Write down the comparison between Macintosh and windows 2000
permissions.
2 List the common networking protocols.
3 Explain in brief
NBF, NetBEUI, IPX, SPX
4 Explain IPX/SPX protocol.

Tutorial - 8
1 Explain RFC, WINS
2 Write down the design goals for the Microsoft DHCP Protocol.
3 What is the primary role of WINS?
4 Write down the similarity and difference between DNS and WINS.
5 Explain DNS.

Tutorial - 9
1 List the attributes (control features) of a User.
2 Define:
Registry, Hive
3 Write down the different types of Root Keys of the windows NT
registry.
4 List six data types for registry entry values of the windows NT registry.
5 Explain the limitations of REGEDIT.EXE tool when used with windows
NT

Tutorial - 10
1 Define:
Server-side application, Client-side application
2 Explain RAS.
3 List the methods for connection for RAS.
4 Explain the difference between PPP and SLIP.
5 List the uses of RAS.

You might also like