ITOPERATIONSANDMANAGEMENT 2
ITOPERATIONSANDMANAGEMENT 2
:
21IT361
B.TECH. DEGREE– NOVEMBER 2022 –EXAMINATIONS
BRANCH: INFORMATION TECHNOLOGY
IT OPERATIONS AND MANAGEMENT
Duration : 3Hours Maximum: 100 Marks
A2. Match the following with its appropriate directory: CO2 (5)
a) kernel files -/sbin
b) pseudo terminals -/etc
c) system commands - /dev
d) system operability -/boot
e)Configuration files -/bin
A3. State the role of the following in ADDS: CO3 (5)
a) FSMO (2.5 marks)
b) GPO links ( 2.5 marks)
A4. Recall the necessity of the following: CO4 (5)
a) Global Catalog (2.5 marks)
b) Network Policy Server (2.5 marks)
PART – B (4 x 5 = 20) CO Marks
B1. Explain the hierarchical file system and types of files present in Linux. CO2 (5)
B2. Describe the process of recursive domain name resolution. CO5 (5)
B3. Explain the differences between DAS and NAS Devices CO6 (5)
B4. Outline the essential components and steps involved in Backup Operations with CO6 (5)
necessary diagrams.
PART – C (4 x 15 = 60 ) CO Marks
C1. Perform the following using appropriate commands: CO1 (15)
i) Display all the groups present in the system.
ii) Create a new user itomuser and new groups itomslot1, itomslot2
iii) Change the ownership of the file to root iv) Get a filename and directory
name from the user and check if they are already existing or not
v) Find all the .txt files in the /home/usr location and archive them in a
directory
[OR]
Contd…………..
C2. Perform the following using appropriate Linux commands: CO1 (15)
i) Change the minimum and maximum age for user passwords
ii) ii) Display the userid of a linux system user and change the userid to 1234.
iii)Write a simple bash script to check whether a number obtained from user is
even or not
iv) Change the user permissions of file1.txt in such a way that only the owner
and group users can read and execute the file while others have no privileges on
the file.
v) Find all the user groups present in the system
C5. Assume that you are system administrator of an organization which has varied CO3 (15)
user roles, lot of users, systems and data.
a) How would you use Group policy of active directory domain service for
monitoring the control panel? b) Identify the steps of setting-up Group Policies
at sites/domains/local groups/OUs at the right hierarchical order.
c) Show the necessary steps involved in setting up ADDS and group policy
objects
[OR]
C6. Assume that you are system administrator of an organization which has varied CO3 (15)
user roles, lot of users, systems and data. The resources need to be broadly
classified based on their geographical location east, west, North, south that are
further organized based on their work areas such as development, testing and
sales.
a) Predict how the resources can be organized as forests and domain trees
containing domains and sub-domains with necessary diagrams b) Identify the
necessary steps involved in setting up domains and domain controllers with
ADDS.
c) Find out the other Active Directory Services.
C7. a) Predict the server role that must be configured to make your application CO4 (15)
servers available on the internet and list the steps for installing the same on
Windows server OS
b) Show the steps for creating a Forward lookup zone in the same
c) Identify the importance of Domain Name System to Active Directory.
[OR]
Contd…………..
C8. Consider that you have a server that hosts number of files that can be publicly CO4 (15)
accessed by the users. As an admin, Show how would you use file server
resource manager to perform the following:
a) Send an email notification for a user who exceeds his prescribed limit
b) Prevent user for uploading video and audio files
c) Create a file management task to dispose the files if they remain unopened
for 6 months
d) Generate report that contains list of files grouped based on owners and their
type
e) Generate report that contain all duplicate files
***************