SlideShare une entreprise Scribd logo
1  sur  9
List of Probable questions


 1. What are the types of Operating System ?


    Real-time Operating System: It is a multitasking operating system that aims at
    executing real-time applications. Real-time operating systems often use specialized
    scheduling algorithms so that they can achieve a deterministic nature of behavior. The
    main object of real-time operating systems is their quick and predictable response to
    events. They either have an event-driven or a time-sharing design. An event-driven
    system switches between tasks based of their priorities while time-sharing operating
    systems switch tasks based on clock interrupts.


    Multi-user and Single-user Operating Systems: The operating systems of this type
    allow a multiple users to access a computer system concurrently. Time-sharing system
    can be classified as multi-user systems as they enable a multiple user access to a
    computer through the sharing of time. Single-user operating systems, as opposed to a
    multi-user operating system, are usable by a single user at a time. Being able to have
    multiple accounts on a Windows operating system does not make it a multi-user
    system. Rather, only the network administrator is the real user. But for a Unix-like
    operating system, it is possible for two users to login at a time and this capability of
    the OS makes it a multi-user operating system.


    Multi-tasking and Single-tasking Operating Systems: When a single program is
    allowed to run at a time, the system is grouped under a single-tasking system, while in
    case the operating system allows the execution of multiple tasks at one time, it is
    classified as a multi-tasking operating system. Multi-tasking can be of two types
    namely, pre-emptive or co-operative. In pre-emptive multitasking, the operating
    system slices the CPU time and dedicates one slot to each of the programs. Unix-like
    operating systems such as Solaris and Linux support pre-emptive multitasking.
    Cooperative multitasking is achieved by relying on each process to give time to the
    other processes in a defined manner. MS Windows prior to Windows 95 used to support
    cooperative multitasking.


    Distributed Operating System: An operating system that manages a group of
    independent computers and makes them appear to be a single computer is known as a
    distributed operating system. The development of networked computers that could be
    linked and communicate with each other, gave rise to distributed computing.
    Distributed computations are carried out on more than one machine. When computers
    in a group work in cooperation, they make a distributed system.


    Embedded System: The operating systems designed for being used in embedded
    computer systems are known as embedded operating systems. They are designed to
    operate on small machines like PDAs with less autonomy. They are able to operate with
a limited number of resources. They are very compact and extremely efficient by
    design. Windows CE, FreeBSD and Minix 3 are some examples of embedded operating
    systems.

 2. Difference between FAT and NTFS.

NTFS

1)allows access local to w2k w2k3 XP win NT4 with SP4 & later may get access for somefile.

2)Maximum size of partition is 2 Terabytes & more.

3)Maximum File size is upto 16TB.

4)File & folder Encryption is possible only in NTFS.

FAT 32

1)Fat 32 Allows access to win 95 98 win millenium win2k xp on local partition.

2)Maximum size of partition is upto 2 TB.

3)Maximum File size is upto 4 GB.

4)File & folder Encryption is not possible.




 3. Enhancements in Windows 2003 from Windows 2000
 4. Enhancements in Windows 2003 from Windows NT
 5. What is Active Directory ?

An active directory is a directory structure used on Microsoft Windows based computers and
servers to store information and data about networks and domains. It is primarily used for
online information and was originally created in 1996. It was first used with Windows 2000.

An active directory (sometimes referred to as an AD) does a variety of functions including
the ability to provide information on objects, helps organize these objects for easy retrieval
and access, allows access by end users and administrators and allows the administrator to
set security up for the directory.




 6. Types of Firewall

Network-Level Firewalls

The first generation of firewalls (c. 1988) worked at the network level by inspecting packet
headers and filtering traffic based on the IP address of the source and the destination, the
port and the service. Some of these primeval security applications could also filter packets
based on protocols, the domain name of the source and a few other attributes.

Network-level firewalls are fast, and today you'll find them built into most network
appliances, particularly routers. These firewalls, however, don't support sophisticated rule-
based models. They don’t understand languages like HTML and XML, and they are capable
of decoding SSL-encrypted packets to examine their content. As a result, they can’t validate
user inputs or detect maliciously modified parameters in an URL request. This leaves your
network vulnerable to a number of serious threats.

Circuit-Level Firewalls

These applications, which represent the second-generation of firewall technology, monitor
TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered
based on specified session rules and may be restricted to recognized computers only.
Circuit-level firewalls hide the network itself from the outside, which is useful for denying
access to intruders. But they don't filter individual packets.

Application-Level Firewalls

Recently, application-level firewalls (sometimes called proxies) have been looking more
deeply into the application data going through their filters. By considering the context of
client requests and application responses, these firewalls attempt to enforce correct
application behavior, block malicious activity and help organizations ensure the safety of
sensitive information and systems. They can log user activity too. Application-level filtering
may include protection against spam and viruses as well, and be able to block undesirable
Web sites based on content rather than just their IP address.

If that sounds too good to be true, it is. The downside to deep packet inspection is that the
more closely a firewall examines network data flow, the longer it takes, and the heavier hit
your network performance will sustain. This is why the highest-end security appliances
include lots of RAM to speed packet processing. And of course you'll pay for the added
chips.

Stateful Multi-level Firewalls - SML vendors claim that their products deploy the best
features of the other three firewall types. They filter packets at the network level and they
recognize and process application-level data, but since they don't employ proxies, they
deliver reasonably good performance in spite of the deep packet analysis. On the downside,
they are not cheap, and they can be difficult to configure and administer.




 7. Difference between Hardware and Software Firewall.

Hardware Firewalls
You can buy a hardware firewall as a stand-alone product, but more recently hardware
firewalls are typically found in broadband routers, and should be considered an important
part of your system and network set-up, especially for anyone on a broadband connection.
Hardware firewalls can be effective with little or no configuration, and they can protect
every machine on a local network. Most hardware firewalls will have a minimum of four
network ports to connect other computers, but for larger networks, business networking
firewall solutions are available.


A hardware firewall examines data packet to determine their source and destination. It
compares this information to a set of predefined or user-created rules that determine
whether the packet should be routed to its destination or blocked and dropped.


A person with general computer knowledge can plug in a firewall, adjust a few settings and
have it work. To ensure that your firewall is configured for optimal security and protect
however, you should learn its specific features, how to use them, and how to test the
firewall to make sure it's protecting your network.


Not all firewalls are created equal, and it's important to read the manual and
documentation. Additionally the manufacturer's Web site usually provides a knowledgebase
or FAQ to help you get started. If the terminology is a too tech-oriented, you can also use
the Webopedia search to help you get a better understanding of some of the computer
terms you will encounter while setting up your hardware firewall.


To test your hardware firewall security, you can purchase third-party test software or search
the Internet for a free online-based firewall testing service. Firewall testing is an important
part of maintenance to ensure your system is always configured for optimal protection.


Software Firewalls
Most people prefer a software firewall. You install a software firewall on individual
computers (just like any software), and you can customize its function and protection
features. A software firewall protects your computer from outside attempts to control or
gain access your computer, and, depending on which firewall you choose, it could also
provide protection against the most common Trojan programs or e-mail worms.


Many software firewalls have user-defined controls for setting up safe file and printer
sharing and to block unsafe applications from running on your system. Additionally,
software firewalls may also incorporate privacy controls, Web filtering (i.e., making certain
types of sites – adult content, gambling, shopping, for example -- inaccessible) and more.
The downside to software firewalls is that they only protect the computer they are installed
on, not a network, so each individual computer needs to have a software firewall installed
on it.


Like hardware firewalls, there is a vast number of software firewalls from which to choose.
To get started you may wish to read reviews of software firewalls and search out the
product Web site to glean some information first. Because your software firewall will always
be running on your computer, you should make note of the system resources it requires and
any incompatibilities with your operating system. A good software firewall will run in the
background on your system and use only a small amount of system resources. It's
important to monitor a software firewall once installed and to download any updates
available from the developer.


The best way to protect your computer and network is to use both types of firewalls, as
each offers different but much-needed security features and benefits. Updating your firewall
and your operating system is essential to maintaining optimal protection, as is testing your
firewall to ensure it is connected and working correctly.


 8. Name the seven layers of OSI model.

Layer 7:Application Layer

Defines interface to user processes for communication and data transfer in network

Provides standardized services such as virtual terminal, file and job transfer and operations

Layer 6:Presentation Layer

Masks the differences of data formats between dissimilar systems

Specifies architecture-independent data transfer format

Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses
data

Layer 5:Session Layer

Manages user sessions and dialogues

Controls establishment and termination of logic links between users

Reports upper layer errors

Layer 4:Transport Layer

Manages end-to-end message delivery in network

Provides reliable and sequential packet delivery through error recovery and flow control
mechanisms

Provides connectionless oriented packet delivery

Layer 3:Network Layer

Determines how data are transferred between network devices
Routes packets according to unique network device addresses

Provides flow and congestion control to prevent network resource depletion

Layer 2:Data Link Layer

Defines procedures for operating the communication links

Frames packets

Detects and corrects packets transmit errors

Layer 1:Physical Layer

Defines physical means of sending data over network devices

Interfaces between network medium and devices

 9. How to enable Firewall in Windows XP.

     A. Click Start, Control Panel, double–click Network Connections, right-click the
     desired connection, Properties, Advanced tab, Under Internet Connection Firewall,
     uncheck or check the Protect my computer and network by limiting or
     preventing access to this computer from the Internet check box.


 10. How to Disable Firewall in Windows XP
 11. Minimum System requirement of Windows XP, Vista, 2003 and 2008
 12. Explain ping command.

Ping is a basic Internet program that allows a user to verify that a particular IP address
exists and can accept requests.

Ping is used diagnostically to ensure that a host computer the user is trying to reach is
actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo
Request to a specified interface on the network and waiting for a reply. Ping can be used for
troubleshooting to test connectivity and determine response time.


 13. pst file location

Win xp – c:doc & setting user name Local SettingsApplication DataMicrosoftOutlook


 14. What is a port number ?


     a port number is part of the addressing information used to identify the senders and receivers
     of messages. Port numbers are most commonly used with TCP/IP connections


 15. Where is the HOSTS file located

     C: windows  system32driversetc
16. Lan cable code –


   Straight –               1. White orange


                            2. Orange


                            3. White green


                            4. Blue


                            5. White blue


                            6. Green


                            7. White brawn


                            8. Brawn




   Cross -         1–3


                            2-6


                            3–1


                            4–4


                            5–5


                            6–2


                            7–7


                            8 – 8.


17. type of backup –


   Normal. - When an administrator chooses to use a normal backup, all selected files and folders
   are backed up and the archive attribute of all files are cleared. A normal backup does not use the
   archive attribute to determine which files to back up. A normal backup is used as the first step of any
   backup plan

   Copy. - Copy backup is a backup that copies all selected files but does not mark each file as
   having been backed up. In other words, the archive attribute is not cleared. Copying can be
carried out between normal and incremental backups because copying does not affect these
     other backup operations.

     Incremental. - A backup of those files which have changed since the last backup of any type.
     An incremental backup is the fastest backup and requires the least storage space on the
     backup media. However, incremental backups also require the longest time and many tapes
     to restore.

     Differential - A backup of those files which have changes since the last full backup. Should be
     performed at regular intervals.

     Daily. - Daily backup refers to making daily copies of data so that these additional copies
     may be used to restore the original after a data loss event. Daily backups can also be
     combined with weekly or monthly full backups, according to the backup scenario used

 18. command to create domain – dcpramo.

The Active Directory Database is Stored in %SYSTEM ROOT%NDTS folder. the active
directory uses the sysvol folder as well
The file is called as ntds.dit. Along with this file there are other files also present in this folder.
The files are created when you run dcpromo.

What is DNS?

Domain Name System (DNS) is a database system that translates a computer's fully qualified
domain name into an IP address.
19.
20. Explain different RAID levels
21. Explain APIPA, IP address and Subnet mask
22. Difference between IP v4 and IP v6
23. How to remove virus from a computer
24. How to make a computer run faster
25. What is attrib command ?
26. What is edit command ?
27. How to copy a file or folder using copy command
28. How to format the hard disk using command line utilities
29. Explain Cookies
30.
31. How to boot the computer in Safe mode
32. What is Disk clean up, Disk Defragmentation, Device manager and System Restore
33. USB port Vs Firewire port
34. How to install a printer in Windows XP
35.
36. Explain mkdir, rmdir and chdir commands
37. Types of hard disk
38. Difference between primary and secondary partition
39. Types of back in Window OS
40. Differential Backup Vs Incremental Backup Vs Copy backup
41. What is remote desktop.
42. Recovery Console Vs Automated System Recovery
43. What is NTLDR file
44. How to tackle "missing NTLDR file" error
45. How many bytes are there in MAC address
46. Range of Class A IP address
47. Range of Class B IP address
48. Range of Class C IP address
49. Default subnet mask of Class A, Class B and Class C IP address
50. What is BSOD (Blue Screen of Death) and how to overcome it
51. Difference between Preferred DNS and Alternate DNS server
52. Transmission speed of T1 carrier

Contenu connexe

Tendances

International Journal of Computer Science and Security Volume (4) Issue (1)
International Journal of Computer Science and Security Volume (4) Issue (1)International Journal of Computer Science and Security Volume (4) Issue (1)
International Journal of Computer Science and Security Volume (4) Issue (1)
CSCJournals
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
IAEME Publication
 
Massively Distributed Systems: Design Issues and Challenge
Massively Distributed Systems: Design Issues and ChallengeMassively Distributed Systems: Design Issues and Challenge
Massively Distributed Systems: Design Issues and Challenge
Darcyzz
 

Tendances (16)

International Journal of Computer Science and Security Volume (4) Issue (1)
International Journal of Computer Science and Security Volume (4) Issue (1)International Journal of Computer Science and Security Volume (4) Issue (1)
International Journal of Computer Science and Security Volume (4) Issue (1)
 
Simulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterSimulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited Metarouter
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNA
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Cloud slide
Cloud slideCloud slide
Cloud slide
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit I
 
Linux Environment
Linux EnvironmentLinux Environment
Linux Environment
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating System
 
Massively Distributed Systems: Design Issues and Challenge
Massively Distributed Systems: Design Issues and ChallengeMassively Distributed Systems: Design Issues and Challenge
Massively Distributed Systems: Design Issues and Challenge
 
Distributed systems1
Distributed systems1Distributed systems1
Distributed systems1
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorized
 

En vedette

March on washington john lewis
March on washington john lewisMarch on washington john lewis
March on washington john lewis
ap566042
 
Seminar anupam ashish_307002_1
Seminar anupam ashish_307002_1Seminar anupam ashish_307002_1
Seminar anupam ashish_307002_1
anupamashish
 
Becker dossier, part 2
Becker dossier, part 2Becker dossier, part 2
Becker dossier, part 2
yahyakhan8
 
Social media integration plan
Social media integration planSocial media integration plan
Social media integration plan
clintgrounds
 
Enable Your Customers 24/7
Enable Your Customers 24/7Enable Your Customers 24/7
Enable Your Customers 24/7
kjluebke
 
Keynote01 -boris--foundation update-8-10-2012
Keynote01 -boris--foundation update-8-10-2012Keynote01 -boris--foundation update-8-10-2012
Keynote01 -boris--foundation update-8-10-2012
OpenCity Community
 

En vedette (20)

In vehiclesmartphoneintegrep sf_v7 final version
In vehiclesmartphoneintegrep sf_v7 final versionIn vehiclesmartphoneintegrep sf_v7 final version
In vehiclesmartphoneintegrep sf_v7 final version
 
Pagenotes
PagenotesPagenotes
Pagenotes
 
March on washington john lewis
March on washington john lewisMarch on washington john lewis
March on washington john lewis
 
영화 바다
영화 바다영화 바다
영화 바다
 
E.e slide show
E.e slide showE.e slide show
E.e slide show
 
Cruzcerna
CruzcernaCruzcerna
Cruzcerna
 
Ukita june 2011pptx
Ukita june 2011pptxUkita june 2011pptx
Ukita june 2011pptx
 
Seminar anupam ashish_307002_1
Seminar anupam ashish_307002_1Seminar anupam ashish_307002_1
Seminar anupam ashish_307002_1
 
Becker dossier, part 2
Becker dossier, part 2Becker dossier, part 2
Becker dossier, part 2
 
1 2
1 21 2
1 2
 
Social media integration plan
Social media integration planSocial media integration plan
Social media integration plan
 
Enable Your Customers 24/7
Enable Your Customers 24/7Enable Your Customers 24/7
Enable Your Customers 24/7
 
ioiu23iul
ioiu23iulioiu23iul
ioiu23iul
 
Ensayo_tutorial_kainos_SWF
Ensayo_tutorial_kainos_SWFEnsayo_tutorial_kainos_SWF
Ensayo_tutorial_kainos_SWF
 
Informal Justice in Post-Oslo Palestine
Informal Justice in Post-Oslo PalestineInformal Justice in Post-Oslo Palestine
Informal Justice in Post-Oslo Palestine
 
A delação de Machado que cita Aécio Neves
A delação de Machado que cita Aécio NevesA delação de Machado que cita Aécio Neves
A delação de Machado que cita Aécio Neves
 
JOTIBA
JOTIBAJOTIBA
JOTIBA
 
Notam Sul/Sudeste - 01-mai-16
Notam Sul/Sudeste - 01-mai-16Notam Sul/Sudeste - 01-mai-16
Notam Sul/Sudeste - 01-mai-16
 
Database List owners' prespective
Database List owners' prespectiveDatabase List owners' prespective
Database List owners' prespective
 
Keynote01 -boris--foundation update-8-10-2012
Keynote01 -boris--foundation update-8-10-2012Keynote01 -boris--foundation update-8-10-2012
Keynote01 -boris--foundation update-8-10-2012
 

Similaire à Desktop support qua

Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
Isuru Vincent
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating system
Ron McGary
 
proposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docxproposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docx
todd921
 

Similaire à Desktop support qua (20)

Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Factors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxFactors Affecting the System Safety || Linux
Factors Affecting the System Safety || Linux
 
Operating system by aman kr kushwaha
Operating system by aman kr kushwahaOperating system by aman kr kushwaha
Operating system by aman kr kushwaha
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Modules1
Modules1Modules1
Modules1
 
Firewall
FirewallFirewall
Firewall
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating system
 
Firewall
FirewallFirewall
Firewall
 
proposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docxproposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docx
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Desktop support qua

  • 1. List of Probable questions 1. What are the types of Operating System ? Real-time Operating System: It is a multitasking operating system that aims at executing real-time applications. Real-time operating systems often use specialized scheduling algorithms so that they can achieve a deterministic nature of behavior. The main object of real-time operating systems is their quick and predictable response to events. They either have an event-driven or a time-sharing design. An event-driven system switches between tasks based of their priorities while time-sharing operating systems switch tasks based on clock interrupts. Multi-user and Single-user Operating Systems: The operating systems of this type allow a multiple users to access a computer system concurrently. Time-sharing system can be classified as multi-user systems as they enable a multiple user access to a computer through the sharing of time. Single-user operating systems, as opposed to a multi-user operating system, are usable by a single user at a time. Being able to have multiple accounts on a Windows operating system does not make it a multi-user system. Rather, only the network administrator is the real user. But for a Unix-like operating system, it is possible for two users to login at a time and this capability of the OS makes it a multi-user operating system. Multi-tasking and Single-tasking Operating Systems: When a single program is allowed to run at a time, the system is grouped under a single-tasking system, while in case the operating system allows the execution of multiple tasks at one time, it is classified as a multi-tasking operating system. Multi-tasking can be of two types namely, pre-emptive or co-operative. In pre-emptive multitasking, the operating system slices the CPU time and dedicates one slot to each of the programs. Unix-like operating systems such as Solaris and Linux support pre-emptive multitasking. Cooperative multitasking is achieved by relying on each process to give time to the other processes in a defined manner. MS Windows prior to Windows 95 used to support cooperative multitasking. Distributed Operating System: An operating system that manages a group of independent computers and makes them appear to be a single computer is known as a distributed operating system. The development of networked computers that could be linked and communicate with each other, gave rise to distributed computing. Distributed computations are carried out on more than one machine. When computers in a group work in cooperation, they make a distributed system. Embedded System: The operating systems designed for being used in embedded computer systems are known as embedded operating systems. They are designed to operate on small machines like PDAs with less autonomy. They are able to operate with
  • 2. a limited number of resources. They are very compact and extremely efficient by design. Windows CE, FreeBSD and Minix 3 are some examples of embedded operating systems. 2. Difference between FAT and NTFS. NTFS 1)allows access local to w2k w2k3 XP win NT4 with SP4 & later may get access for somefile. 2)Maximum size of partition is 2 Terabytes & more. 3)Maximum File size is upto 16TB. 4)File & folder Encryption is possible only in NTFS. FAT 32 1)Fat 32 Allows access to win 95 98 win millenium win2k xp on local partition. 2)Maximum size of partition is upto 2 TB. 3)Maximum File size is upto 4 GB. 4)File & folder Encryption is not possible. 3. Enhancements in Windows 2003 from Windows 2000 4. Enhancements in Windows 2003 from Windows NT 5. What is Active Directory ? An active directory is a directory structure used on Microsoft Windows based computers and servers to store information and data about networks and domains. It is primarily used for online information and was originally created in 1996. It was first used with Windows 2000. An active directory (sometimes referred to as an AD) does a variety of functions including the ability to provide information on objects, helps organize these objects for easy retrieval and access, allows access by end users and administrators and allows the administrator to set security up for the directory. 6. Types of Firewall Network-Level Firewalls The first generation of firewalls (c. 1988) worked at the network level by inspecting packet headers and filtering traffic based on the IP address of the source and the destination, the
  • 3. port and the service. Some of these primeval security applications could also filter packets based on protocols, the domain name of the source and a few other attributes. Network-level firewalls are fast, and today you'll find them built into most network appliances, particularly routers. These firewalls, however, don't support sophisticated rule- based models. They don’t understand languages like HTML and XML, and they are capable of decoding SSL-encrypted packets to examine their content. As a result, they can’t validate user inputs or detect maliciously modified parameters in an URL request. This leaves your network vulnerable to a number of serious threats. Circuit-Level Firewalls These applications, which represent the second-generation of firewall technology, monitor TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered based on specified session rules and may be restricted to recognized computers only. Circuit-level firewalls hide the network itself from the outside, which is useful for denying access to intruders. But they don't filter individual packets. Application-Level Firewalls Recently, application-level firewalls (sometimes called proxies) have been looking more deeply into the application data going through their filters. By considering the context of client requests and application responses, these firewalls attempt to enforce correct application behavior, block malicious activity and help organizations ensure the safety of sensitive information and systems. They can log user activity too. Application-level filtering may include protection against spam and viruses as well, and be able to block undesirable Web sites based on content rather than just their IP address. If that sounds too good to be true, it is. The downside to deep packet inspection is that the more closely a firewall examines network data flow, the longer it takes, and the heavier hit your network performance will sustain. This is why the highest-end security appliances include lots of RAM to speed packet processing. And of course you'll pay for the added chips. Stateful Multi-level Firewalls - SML vendors claim that their products deploy the best features of the other three firewall types. They filter packets at the network level and they recognize and process application-level data, but since they don't employ proxies, they deliver reasonably good performance in spite of the deep packet analysis. On the downside, they are not cheap, and they can be difficult to configure and administer. 7. Difference between Hardware and Software Firewall. Hardware Firewalls You can buy a hardware firewall as a stand-alone product, but more recently hardware firewalls are typically found in broadband routers, and should be considered an important part of your system and network set-up, especially for anyone on a broadband connection. Hardware firewalls can be effective with little or no configuration, and they can protect every machine on a local network. Most hardware firewalls will have a minimum of four
  • 4. network ports to connect other computers, but for larger networks, business networking firewall solutions are available. A hardware firewall examines data packet to determine their source and destination. It compares this information to a set of predefined or user-created rules that determine whether the packet should be routed to its destination or blocked and dropped. A person with general computer knowledge can plug in a firewall, adjust a few settings and have it work. To ensure that your firewall is configured for optimal security and protect however, you should learn its specific features, how to use them, and how to test the firewall to make sure it's protecting your network. Not all firewalls are created equal, and it's important to read the manual and documentation. Additionally the manufacturer's Web site usually provides a knowledgebase or FAQ to help you get started. If the terminology is a too tech-oriented, you can also use the Webopedia search to help you get a better understanding of some of the computer terms you will encounter while setting up your hardware firewall. To test your hardware firewall security, you can purchase third-party test software or search the Internet for a free online-based firewall testing service. Firewall testing is an important part of maintenance to ensure your system is always configured for optimal protection. Software Firewalls Most people prefer a software firewall. You install a software firewall on individual computers (just like any software), and you can customize its function and protection features. A software firewall protects your computer from outside attempts to control or gain access your computer, and, depending on which firewall you choose, it could also provide protection against the most common Trojan programs or e-mail worms. Many software firewalls have user-defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your system. Additionally, software firewalls may also incorporate privacy controls, Web filtering (i.e., making certain types of sites – adult content, gambling, shopping, for example -- inaccessible) and more. The downside to software firewalls is that they only protect the computer they are installed on, not a network, so each individual computer needs to have a software firewall installed on it. Like hardware firewalls, there is a vast number of software firewalls from which to choose. To get started you may wish to read reviews of software firewalls and search out the product Web site to glean some information first. Because your software firewall will always
  • 5. be running on your computer, you should make note of the system resources it requires and any incompatibilities with your operating system. A good software firewall will run in the background on your system and use only a small amount of system resources. It's important to monitor a software firewall once installed and to download any updates available from the developer. The best way to protect your computer and network is to use both types of firewalls, as each offers different but much-needed security features and benefits. Updating your firewall and your operating system is essential to maintaining optimal protection, as is testing your firewall to ensure it is connected and working correctly. 8. Name the seven layers of OSI model. Layer 7:Application Layer Defines interface to user processes for communication and data transfer in network Provides standardized services such as virtual terminal, file and job transfer and operations Layer 6:Presentation Layer Masks the differences of data formats between dissimilar systems Specifies architecture-independent data transfer format Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data Layer 5:Session Layer Manages user sessions and dialogues Controls establishment and termination of logic links between users Reports upper layer errors Layer 4:Transport Layer Manages end-to-end message delivery in network Provides reliable and sequential packet delivery through error recovery and flow control mechanisms Provides connectionless oriented packet delivery Layer 3:Network Layer Determines how data are transferred between network devices
  • 6. Routes packets according to unique network device addresses Provides flow and congestion control to prevent network resource depletion Layer 2:Data Link Layer Defines procedures for operating the communication links Frames packets Detects and corrects packets transmit errors Layer 1:Physical Layer Defines physical means of sending data over network devices Interfaces between network medium and devices 9. How to enable Firewall in Windows XP. A. Click Start, Control Panel, double–click Network Connections, right-click the desired connection, Properties, Advanced tab, Under Internet Connection Firewall, uncheck or check the Protect my computer and network by limiting or preventing access to this computer from the Internet check box. 10. How to Disable Firewall in Windows XP 11. Minimum System requirement of Windows XP, Vista, 2003 and 2008 12. Explain ping command. Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests. Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting to test connectivity and determine response time. 13. pst file location Win xp – c:doc & setting user name Local SettingsApplication DataMicrosoftOutlook 14. What is a port number ? a port number is part of the addressing information used to identify the senders and receivers of messages. Port numbers are most commonly used with TCP/IP connections 15. Where is the HOSTS file located C: windows system32driversetc
  • 7. 16. Lan cable code – Straight – 1. White orange 2. Orange 3. White green 4. Blue 5. White blue 6. Green 7. White brawn 8. Brawn Cross - 1–3 2-6 3–1 4–4 5–5 6–2 7–7 8 – 8. 17. type of backup – Normal. - When an administrator chooses to use a normal backup, all selected files and folders are backed up and the archive attribute of all files are cleared. A normal backup does not use the archive attribute to determine which files to back up. A normal backup is used as the first step of any backup plan Copy. - Copy backup is a backup that copies all selected files but does not mark each file as having been backed up. In other words, the archive attribute is not cleared. Copying can be
  • 8. carried out between normal and incremental backups because copying does not affect these other backup operations. Incremental. - A backup of those files which have changed since the last backup of any type. An incremental backup is the fastest backup and requires the least storage space on the backup media. However, incremental backups also require the longest time and many tapes to restore. Differential - A backup of those files which have changes since the last full backup. Should be performed at regular intervals. Daily. - Daily backup refers to making daily copies of data so that these additional copies may be used to restore the original after a data loss event. Daily backups can also be combined with weekly or monthly full backups, according to the backup scenario used 18. command to create domain – dcpramo. The Active Directory Database is Stored in %SYSTEM ROOT%NDTS folder. the active directory uses the sysvol folder as well The file is called as ntds.dit. Along with this file there are other files also present in this folder. The files are created when you run dcpromo. What is DNS? Domain Name System (DNS) is a database system that translates a computer's fully qualified domain name into an IP address.
  • 9. 19. 20. Explain different RAID levels 21. Explain APIPA, IP address and Subnet mask 22. Difference between IP v4 and IP v6 23. How to remove virus from a computer 24. How to make a computer run faster 25. What is attrib command ? 26. What is edit command ? 27. How to copy a file or folder using copy command 28. How to format the hard disk using command line utilities 29. Explain Cookies 30. 31. How to boot the computer in Safe mode 32. What is Disk clean up, Disk Defragmentation, Device manager and System Restore 33. USB port Vs Firewire port 34. How to install a printer in Windows XP 35. 36. Explain mkdir, rmdir and chdir commands 37. Types of hard disk 38. Difference between primary and secondary partition 39. Types of back in Window OS 40. Differential Backup Vs Incremental Backup Vs Copy backup 41. What is remote desktop. 42. Recovery Console Vs Automated System Recovery 43. What is NTLDR file 44. How to tackle "missing NTLDR file" error 45. How many bytes are there in MAC address 46. Range of Class A IP address 47. Range of Class B IP address 48. Range of Class C IP address 49. Default subnet mask of Class A, Class B and Class C IP address 50. What is BSOD (Blue Screen of Death) and how to overcome it 51. Difference between Preferred DNS and Alternate DNS server 52. Transmission speed of T1 carrier