Professional Documents
Culture Documents
IBM Daksh Question
IBM Daksh Question
IBM Daksh Question
2) Options virtualization
3) DHCP, How it works
4) DNS Operation
5) Port number of DNS and DHCP
6) What are client OS and server OS their examples
7) Work experience(basic details, why did you leave, and reason to join Concentrix)
8) POST and its operation
9) Boot process, steps what we can see after starting the boot process
10) BIOS
11) Difference between device drivers and Firmware
Concept of Booting
Booting
Booting is basically the process of starting the computer. When the
CPU is first switched on it has nothing inside the Memory. In order to
start the Computer, load the Operating System into the Main Memory
and then Computer is ready to take commands from the User. Learn the
types of booting.
Boot Devices
Booting can be done either through hardware (pressing the start button)
or by giving software commands. Therefore, a boot device is a device
that loads the operating system. Moreover, it contains the instructions
and files which start the computer. Examples are the hard drive, floppy
disk drive, CD drive, etc. Among them, the hard drive is the most used
one.
Types of Booting
There are two types of booting:
Cold Booting
A cold boot is also called a hard boot. It is the process when we first
start the computer. In other words, when the computer is started from its
initial state by pressing the power button it is called cold boot. The
instructions are read from the ROM and the operating system is loaded
in the main memory.
Warm Booting
Warm Boot is also called soft boot. It refers to when we restart the
computer. Here, the computer does not start from the initial state. When
the system gets stuck sometimes it is required to restart it while it is ON.
Therefore, in this condition the warm boot takes place. Restart button or
CTRL+ALT+DELETE keys are used for warm boot.
Steps of Booting
We can describe the boot process in six steps:
1. The Startup
It is the first step that involves switching the power ON. It supplies
electricity to the main components like BIOS and processor.
3. Loading of OS
In this step, the operating system is loaded into the main memory. The
operating system starts working and executes all the initial files and
instructions.
4. System Configuration
In this step, the drivers are loaded into the main memory. Drivers are
programs that help in the functioning of the peripheral devices.
6. User Authentication
If any password has been set up in the computer system, the system
checks for user authentication. Once the user enters the login Id and
password correctly the system finally starts.
A3. Boot devices are the devices that have the operating system loaded
inside them during the boot process. Common devices are the hard
drive, disk drive, floppy drive, etc.
A5. We perform this so that the operating system along with the initial
files and instructions load into the main memory. And as a result, the
computer starts.
1. The start-up
2. Power On Self Test
3. Loading OS
4. System Configuration
5. Loading system utilities
6. User authentication
What is virtualization?
Image by:
Opensource.com
What is a hypervisor?
A hypervisor is a program for creating and running virtual machines.
Hypervisors have traditionally been split into two classes: type one, or "bare
metal" hypervisors that run guest virtual machines directly on a system's
hardware, essentially behaving as an operating system. Type two, or "hosted"
hypervisors behave more like traditional applications that can be started and
stopped like a normal program. In modern systems, this split is less prevalent,
particularly with systems like KVM. KVM, short for kernel-based virtual
machine, is a part of the Linux kernel that can run virtual machines directly,
although you can still use a system running KVM virtual machines as a normal
computer itself.
Benefits of DHCP
DHCP provides a range of benefits to network administrators:
Mobility
IP address optimization
DHCP components
When working with DHCP, it’s important to understand all of its
components. Below is a list of them and what they do:
DHCP server
IP address pool
Subnet
Lease
The length of time for which a DHCP client holds the IP address
information is known as the lease. When a lease expires, the client
must renew it.
DHCP relay
Assigning IP addresses
The existential question associated with DHCP is how does an end
user connect to the network in the first place without having an IP
address?
The answer is that there’s a complex system of back-and-forth
requests and acknowledgments. First, all modern device operating
systems include a DHCP client, which is typically enabled by default.
In order to request an IP address, the client device sends out a
broadcast message—DHCPDISCOVER. The network directs that
request to the appropriate DHCP server.
This is all done quickly and automatically and without the need for the
end user to take any action. The catch is that the IP address isn’t
permanent. It’s only good for a specified period of time, known as the
lease time.
Default gateway
Subnet mask
IP networking uses a subnet mask for separate the host address and
the network address portions of an IP address.
DNS server
An attacker could take over or spoof the DHCP server and hand out
bad information to legitimate end users, sending them to a fake site.
Or it could hand out legitimate IP addresses to unauthorized users.
This could lead to man-in-the-middle attacks and denial of service
attacks.
Once the request reaches the correct root server, it goes to a top-level
domain (TLD) name server, which stores the information for the
second-level domain, the words used before you get to
the .com, .org, .net (for example, that information for
networkworld.com is “networkworld”). The request then goes to the
Domain Name Server, which holds the information about the site and
its IP address. Once the IP address is discovered, it is sent back to the
client, which can now use it to visit the website. All of this takes mere
milliseconds.
Because DNS has been working for the past 30-plus years, most
people take it for granted. Security also wasn’t considered when
building the system, so hackers have taken full advantage of this,
creating a variety of attacks.
As more domain names are created, and more devices continue to join
the network via internet of things devices and other “smart” systems,
and as more sites migrate to IPv6, maintaining a healthy DNS
ecosystem will be required. The growth of big data and analytics
also brings a greater need for DNS management.
SIGRed: A wormable DNS flaw rears its head
The world got a good look recently at the sort of chaos weaknesses in
DNS could cause with the discovery of a flaw in Windows DNS servers.
The potential security hole, dubbed SIGRed, requires a complex
attack chain, but can exploit unpatched Windows DNS servers to
potentially install and execute arbitrary malicious code on clients. And
the exploit is "wormable," meaning that it can spread from computer
to computer without human intervention. The vulnerability was
considered alarming enough that U.S. federal agencies were given
only a few days to install patches.
It's a move not without controversy. Paul Vixie, who did much of the
early work on the DNS protocol back in the 1980s, calls the move a
"disaster" for security: corporate IT will have a much harder time
monitoring or directing DoH traffic that traverses their network, for
instance. Still, Chrome is omnipresent and DoH will soon be turned on
by default, so we'll see what the future holds.
History of BIOS
The term BIOS was first coined in 1975 by American computer scientist Gary Kildall.
It was incorporated into IBM's first personal computer in 1981 and, in the years to
come, gained popularity within other PCs, becoming an integral part of computers for
some time. However, BIOS' popularity has waned in favor of a newer technology:
Unified Extensible Firmware Interface (UEFI). Intel announced a plan in 2017 to
retire support for legacy BIOS systems by 2020, replacing them with UEFI.
Uses of BIOS
The main use of BIOS is to act as a middleman between OSes and the hardware they
run on. BIOS is theoretically always the intermediary between the microprocessor and
I/O device control information and data flow. Although, in some cases, BIOS can
arrange for data to flow directly to memory from devices, such as video cards, that
require faster data flow to be effective.
When BIOS boots up a computer, it first determines whether all of the necessary
attachments are in place and operational. Any piece of hardware containing files the
computer needs to start is called a boot device. After testing and ensuring boot devices
are functioning, BIOS loads the OS -- or key parts of it -- into the computer's random
access memory (RAM) from a hard disk or diskette drive (the boot device).
The 4 functions of BIOS
BIOS identifies, configures, tests and connects computer hardware to the OS
immediately after a computer is turned on. The combination of these steps is called
the boot process.
These tasks are each carried out by BIOS' four main functions:
1. Power-on self-test (POST). This tests the hardware of the computer before
loading the OS.
3. Software/drivers. This locates the software and drivers that interface with the OS
once running.
Users can access BIOS and configure it through BIOS Setup Utility. Accessing BIOS
Setup Utility varies somewhat depending on the computer being used. However, the
following steps generally enable users to access and configure BIOS through Setup
Utility:
When the computer turns back on, look for a message that says "entering setup"
or something similar. Accompanying that message will be a key that the user
should press to enter system configuration. Here's an example message a user
might see: "Press [key] to enter BIOS setup." Some keys often used as prompts
are Del, Tab, Esc and any of the function keys (F1-F12).
Once in BIOS Setup Utility, users can change hardware settings, manage memory
settings, change the boot order or boot device, and reset the BIOS password, among
other configuration tasks.
BIOS security
BIOS security is a somewhat overlooked component of cybersecurity; however, it
should still be managed to prevent hackers from executing malicious code on the
OS. Security group Cylance, in 2017, showed how modern BIOS security flaws could
enable ransomware programs inside a motherboard's UEFI and exploit other PC BIOS
vulnerabilities.
BIOS manufacturers
BIOS, in its beginnings, was originally owned by IBM. However, some companies,
such as Phoenix Technologies, have reverse-engineered IBM's original version to
create their own. Phoenix, in doing this, allowed other companies to create clones of
the IBM PC and, more importantly, create non-IBM computers that work with BIOS.
One company that did this was Compaq.
Today, many manufacturers produce motherboards with BIOS chips in them. Some
examples are the following:
AMI
Asus
Foxconn
Ricoh
What is a Firmware?
Firmware is a set of instructions programmed into a hardware
device, typically in non-volatile memory such as read-only
memory or flash memory. Firmware is a special form of software
that enables a device to perform functions without the need of
installing additional software. It refers to computer programs and
data loaded into a class of memory that cannot be dynamically
modified by the computer during processing. Firmware includes
the internal set of instructions used by a hardware device for
initiation and operation, often encoded in non-volatile memory. A
basic input output system (BIOS) chip is a common example of a
firmware. The computer programs and data contained in
firmware are classified as software. Firmware is typically stored in
the read-only memory of a hardware device, and can be erased
and rewritten. Firmware updates often require specialized
standalone applications, custom boot mechanisms, and require
extensive research as each vendor provides one or more versions
of firmware updates for its device.
Functionality
Purpose