You are on page 1of 3

Name:_ Kashif Kamran__________________ Location: Karachi , Pakistan__________________ Date: ____july 22nd 2011_________________ Time: ____4.00 p.

m_______________________

Q1. What is the difference in IP ver. 4 & IP ver. 6? IPv4 is 32 bits IP address that we use commonly, it can be 192.168.8.1, 10.3.4.5 or other 32 bits IP addresses. IPv4 can support up to 232 addresses, however the 32 bits IPv4 addresses are finishing to be used in near future, so IPv6 is developed as a replacement. IPv6 is 128 bits, can support up to 2128 addresses to fulfil future needs with better security and network related features Q2. One guest connects his laptop to your office network. What are the potential threats to your network? A virus can be a hassle if it infects your office network can be disastrous. Fortunately, there are many steps you can take to protect your network. Automatic anti-virus scans The first place to start with virus protection is to set up automatic scanning for all user computers and servers. The scans can be set to run during off-peak hours so they don't interrupt business productivity, but they should be run on a regular basis. Automatic Wireless Connections When it comes to wireless, many laptops will connect to "Any available network" and "Automatically connect to non-preferred networks". Convenient? Yes. But also risky. In plain English, this means your laptop will connect indiscriminately to whatever available wireless signal is strongest. And in order for that to happen, it means there's likely no encryption or other controls in place to ensure your data isn't being sent and received in plain text - openly readable by anyone nearby who has the proper tools. And you can almost bet there will be. Dynamic Local Linking Wireless ready laptops running Windows XP and 2000 have an additional security concern - a feature known as dynamic local linking. Absent any other available network, these operating systems will create their own local area network using the private 169.254.x.x IP address range and broadcast their availability using the same SSID from their last successful wireless connection. This feature may make it easier to establish local networks, but it could be exploited by attackers. File and Printer Sharing Chances are, your laptop or PC is configured with File and Printer Sharing enabled. If you've shared any folders in Windows XP Home, these will be automatically available to anyone who

shares the same network with you, making it easier for anyone using the same wireless network to get access to your data. And if it's easier for people to get unauthorized access, it's that much easier for viruses and worms as well.

Q3. Write the class of the following IP addresses: A. B. C. D. E. 191.225.1.5 129.254.10.10 10.10.10.10 65.65.1.1 202.105.5.4 Class B Class B Class A Class A Class C

Q4. Which one the good connector type in terms of speed and use? CAT3, CAT5, CAT7, CAT6 As per my opinion is CAT6

Q5. Which of the following have the potential to transmit malware from one place to other: A. B. C. D. E. F. Internet connection RJ-45 connector for LAN USB port enabled in the system Flash drive placed over the external hard drive Two mobiles having blue-tooth connection ready Keyboard and mouse of the computer

Answer: C, E,A,D

Q6. Write a note on a computer virus?

A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

Q7. Which one of the following is better computer system: A. Xeon CPU dual core 4G RAM 1T HD HP Brand B. Core i7 8G RAM 800GB HD Brand Dell

Answer

Q8. Which of the following language is more close to human language? A. B. C. D. Assembly Language Pascal Java C/C++

Answer Answer Answer

Q9. What are the elements of highly available data center?

Virtualizationnetwork, server and storage High Availability/Disaster Recovery (HADR) Visibilitynot only in network traffic and security events, but also into application traffic Connectivityubiquitous connectivity to disparate sets of resources Security security and compliance Policy and Controlcentralized policy and control Quality of Service (QoS) High Performanceapplications, storage, servers and the network

Q10. Write the time and resources need to configure highly secure email server. Regarding Time it will be depend over the scenario , Resources : Microsoft Exchange Server 2010 is best as per my opinion ,with Clustering Enable using TLS Encrypted Tunnel , using Filtering, Policy Enforcement, and other features ,because I have no experience right now regarding exchange 2010 but Insha Allah I will cover later on .

You might also like