What steps can one take to enhance the physical security of a computer

Networking Management

What steps can one take to enhance the physical security of a computer

Note :
(i) Question number 1 is compulsory and carrries 40 marks
(ii) Attempt any three questions from the rest
1. (A)Describe The Auditing Facilities Of Windows 2000. 5 Marks
B)What Steps Can One Take To Enhance The Physical Security Of A Computer? 5 Marks
(C)Why Is It Important To Disable The NULL Session On A Computer In A Network ? How Can You Do This In Windows 2000? 5 Marks
(D)What Is The General Format Of A Linux Command? How Would You Handle Special Characters In An Argument To A Command? 5marks
(E) What Are The Advantages Of Llinux As An Operating System Over Those Of The Microsoft Family? 5 Marks
(F) How Would You Harden A Windows 2000 System To Reduce The Vulnerability Of A Guest Account? 5 Marks
(G) How Can A Windows 2000 Machine Be Assigned An IP Address At Startup? 5marks
(H) How Does A Thread Differ From An Operating System Process? 5 Marks
2.(A)Describe The File Transfer Protocol (FTP) And The Usage Of The Ftp Utility. What Are Its Security Loopholes? 10 Marks
(B) You Have A File In Linux On Which You Do Not Have Write Permission. If You Do Have Write Permission On The Directory In Which The File Is Located, How Can You Change The Contents Of The File? 6 Marks
(C )What Are The Characteristics Of The 7 RAID Levels? 4 Marks
3. (A)Describe The Working Of He Ipsec Framework For Private Transmission Over An IP Network? 10 Marks
(B)What Are The Standard Input, Standard Output And Standard Error In Linux? How Are They Used In Pipelines And Filters? 6 Marks
(C )Describe The Cal Command And Its Important Options? 4 Marks

What steps can one take to enhance

4. (A)What Is Symmetric Multiprocessing? Describe Its Architecture And Benefits? 8marks
(B)How Does One Set Up A Domain In Windows 2000? How Are Trust Relationships Between Domains Established? 4 Marks
( C) How Does The Shadow Password File Enhance Security In Linux? 4marks
5. Explain The Following With Suitable Examples Where Needed. 20 Marks
(I) Dynamic IP Address Allocation
(Ii) Full, Incremental And Differential Backup
(Iii) We Command In Linux
(Iv) Windows Explorer

Image result for physical security of a computer

 

 

We at Case Study offer all types of online academic assistance, be it homework help, coursework help, case study help, Assignment help, Project Reports, Thesis, Research paper writing help.
And for each service, each subject and each topic, we dedicate an expert writer who has knowledge in that specific field of study. Experience impeccable academic writing service like never before.
Our experts understand that the time of the customers is very precious. The professors of universities and colleges are very rigorous about the submission deadlines of projects or assignments. Hence, the key objective of our case study help service is to deliver the assignments to the customers even before the promised submission deadlines.
We keep the quality measures for all papers which mean we will provide best essays. Our editing services are also excellent. Before submitting any essays, we will check whether the papers writer well or not. The high standards of academic writing will exceed your expectations. With our quality service, we have satisfied more number of people across the world and also work with different universities in Australia, UK, USA, Dubai, Oman, etc.
  • Assignment Help
  • Case study help
  • Project Report
  • Report Writing
  • Homework
  • Essay writing and editing
  • Dissertation writing
  • Thesis writing & editing
  • Academic writing