Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Asignment 505 Zangbu

Download as pdf or txt
Download as pdf or txt
You are on page 1of 128

ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Unit Assessment Pack (UAP) – Cover Sheet
Student and Trainer/Assessor Details
Student ID 5016391
Student name Zangbu sherpa
Contact number 0405540357
Email address Jumbosherpa56@gmail.com
Trainer/Assessor name Gitam Lama

Course and Unit Details


Course code ICT50115
Course name Diploma of IT
Unit code ICTNWK505

Unit name Design, build and test a network server

Assessment Submission Method


☐ By hand to trainer/assessor ☐ By email to ☐ Online submission via Learning
trainer/assessor Management System (LMS)

☐ By Australia Post to RTO ☐ Any other method


_________________________________________________
(Please mention here)

Student Declaration
 I certify that the work submitted for this assessment pack is my own. I have clearly
referenced any sources used in my submission. I understand that a false declaration is a form
of malpractice;
 I have kept a copy of this assessment pack and all relevant notes, attachments, and reference
material that I used in the production of the assessment pack;
 For the purposes of assessment, I give the trainer/assessor of this assessment the permission
to:
o Reproduce this assessment and provide a copy to another member of staff; and
o Take steps to authenticate the assessment, including communicating a copy of this
assessment to a checking service (which may retain a copy of the assessment on its
database for future plagiarism checking).

Student signature: ________________________________

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 1 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Date: ___19_/09_____/____2018__________

Assessment Plan
To demonstrate competence in this unit, you must be assessed as satisfactory in each of the
following assessment tasks.

Evidence recorded Evidence Type/ Method of assessment Sufficient evidence


recorded/Outcome
Unit Assessment Task 1 Unit Knowledge Test (UKT) S / NS (First Attempt)
S / NS (Second Attempt)
Unit Assessment Task 2 Unit Project (UP) S / NS (First Attempt)
S / NS (Second Attempt)
Unit Assessment Task 3 Unit Project (UP) S / NS (First Attempt)
S / NS (Second Attempt)

Final result C/NYC Date assessed

Trainer/Assessor
Signature

Assessment Conditions
Unit purpose/application

This unit describes the skills and knowledge required to design, install and test a server in a complex
network environment.

It applies to individuals who are employed in network or systems engineering roles, such as network
engineers who are required to design and build network servers in a complex computing
environment of medium-to-large organisations.

No licensing, legislative or certification requirements apply to this unit at the time of publication
What the student can expect to learn by studying this unit of competency

• Plan and design network servers to meet business requirements


• Prepare for network server installation
• Build and configure the servers according to design
• Test and reconfigure network servers
• Complete and document network design and installation

Training and assessment resources required for this unit of competency

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 2 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 The student will have access to the following:
 Learner guide
 PowerPoint presentation
 Unit Assessment Pack (UAP)
 Access to other learning materials such as textbooks
The resources required for these assessment tasks also included:
 A site where server installation may be conducted
 Relevant server specifications
 Cabling
 Networked (LAN) computers
 Server diagnostic software
 Switching equipment
 Client requirements
 Wide area network (WAN) service point of presence
 Workstations
 Relevant regulatory documentation that affects installation activities.
Your trainer/assessor will confirm assessment submission details for each assessment task.

Academic integrity, plagiarism and collusion


Academic Integrity
Academic Integrity is about the honest presentation of your academic work. It means acknowledging the
work of others while developing your own insights, knowledge and ideas.
As a student, you are required to:
 undertake studies and research responsibly and with honesty and integrity
 ensure that academic work is in no way falsified
 seek permission to use the work of others, where required
 acknowledge the work of others appropriately
 take reasonable steps to ensure other students cannot copy or misuse your work.

Plagiarism
Plagiarism means to take and use another person's ideas and or manner of expressing them and to pass
them off as your own by failing to give appropriate acknowledgement. This includes material sourced
from the internet, RTO staff, other students, and from published and unpublished work.
Plagiarism occurs when you fail to acknowledge that the ideas or work of others are being used, which
includes:
 Paraphrasing and presenting work or ideas without a reference
 Copying work either in whole or in part
 Presenting designs, codes or images as your own work
 Using phrases and passages verbatim without quotation marks or referencing the author or
web page
 Reproducing lecture notes without proper acknowledgement.

Collusion
Collusion means unauthorised collaboration on assessable work (written, oral or practical) with other
people. This occurs when a student presents group work as their own or as the work of someone else.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 3 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Collusion may be with another RTO student or with individuals or students external to the RTO. This
applies to work assessed by any educational and training body in Australia or overseas.
Collusion occurs when you work without the authorisation of the teaching staff to:
 Work with one or more people to prepare and produce work
 Allow others to copy your work or share your answer to an assessment task
 Allow someone else to write or edit your work (without rto approval)
 Write or edit work for another student
 Offer to complete work or seek payment for completing academic work for other students.
Both collusion and plagiarism can occur in group work. For examples of plagiarism, collusion and
academic misconduct in group work please refer to the RTO’s policy on Academic integrity, plagiarism and
collusion.
Plagiarism and collusion constitute cheating. Disciplinary action will be taken against students who
engage in plagiarism and collusion as outlined in RTO’s policy.
Proven involvement in plagiarism or collusion may be recorded on students’ academic file and could lead
to disciplinary action.

Other Important unit specific Information


N/A

Unit outcome
 This unit is not graded and the student must complete and submit all requirements for the
assessment task for this cluster or unit of competency to be deemed competent.
 Students will receive a 'satisfactorily completed' (S) or 'not yet satisfactorily completed (NS)
result for each individual unit assessment task (UAT).
 Final unit result will be recorded as competency achieved/competent (C) or competency not
yet achieved/not yet competent (NYC).

Prerequisite/s

Nil

Co-requisite/s

Nil

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 4 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Foundation Skills

The Foundation Skills describe those required skills (learning, oral communication, reading, writing,
numeracy, digital technology and employment skills) that are essential to performance. Foundation skills
essential to performance are explicit in the performance criteria of this unit of competency.

Relevant Legislation

 Australian Human Rights Commission Act 1986


 Age Discrimination Act 2004
 Disability Discrimination Act 1992
 Racial Discrimination Act 1975
 Sex Discrimination Act 1984
 The Privacy Act 1988 (Privacy Act) and Australian Privacy Principles (APPs)
 Occupational Health and Safety Act 2004
 Work Health and Safety Act 2011

Principles of assessment and rules of evidence

All assessment tasks will ensure that the principles of assessment and rules of evidence are adhered
to.

The principles of assessment are that assessment must be valid, fair, flexible, reliable and consistent.
The rules of evidence state that evidence must be sufficient, valid, current and authentic.

AQF Level

AQF levels and the AQF levels criteria are an indication of the relative complexity and/or depth of
achievement and the autonomy required to demonstrate that achievement.

All assessment tasks must ensure compliance with the requirements of AQF level and the AQF level
criteria. For more information, please visit http://www.aqf.edu.au/

Further Information

For further information about this unit go to https://training.gov.au/Training/Details/ICTNWK505


Additional Information
• This information will be managed by the provisions of the Privacy Act and the Freedom of
Information Act.)
• Students are required to satisfactorily complete and submit all assessment tasks that
contribute to the assessment for a unit.
• Students will be provided with one more attempt to complete this Unit assessment pack
(UAP) if trainer/assessor deems them not satisfactorily completed (NS) in any Unit
assessment task (UAT).
• Unit Pre-Assessment Checklist (UPAC) will be reviewed by the trainer/assessor to ensure
the student is ready for the assessment.
• Feedback regarding this Unit Assessment Pack (UAP) can be emailed to the compliance
and quality assurance department/administration department in your RTO for
continuously improving our assessment and student resources.
Australian Training School trading as Southern Academy of Business and Technology
Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 5 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Feedback to student
Feedback on students’ assessment performance is a vital element in their learning. Its purpose is to
justify to students how their competency was assessed, as well as to identify and reward specific
qualities in their work, to recommend aspects needing improvement, and to guide students on what
steps to take.

Feedback defines for students what their trainer/assessor thinks is important for a topic or a subject.
At its best, feedback should:
• Be provided for each Unit Assessment Task (UAT)
• Guide students to adapt and adjust their learning strategies
• Guide trainers/assessors to adapt and adjust teaching to accommodate students’ learning
needs
• Be a pivotal feature of learning and assessment design, not an add-on ritual
• Focus on course and unit learning outcomes
• Guide students to become independent and self-reflective learners and their own critics
• Acknowledge the developmental nature of learning.

If students have not received proper feedback, they must speak to compliance and quality assurance
department/administration department in the RTO/person responsible for looking after the quality
and compliance services of the RTO.

For more information, please refer to RTO Student Handbook.

Unit Pre-Assessment Checklist (UPAC)


UAT 1 – Unit Knowledge Test (UKT)
Purpose of the checklist
The pre-assessment checklist helps students determine if they are ready for assessment. The
trainer/assessor must review the checklist with the student before the student attempts the
assessment task. If any items of the checklist are incomplete or not clear to the student, the
trainer/assessor must provide relevant information to the student to ensure they understand the
requirements of the assessment task. The student must ensure they are ready for the assessment
task before undertaking it.
Section 1: Information for Students
 Please make sure you have completed the necessary prior learning before attempting this
assessment.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 6 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 Please make sure your trainer/assessor clearly explained the assessment process and tasks
to be completed.
 Please make sure you understand what evidence is required to be collected and how.
 Please make sure you know your rights and the Complaints and Appeal process.
 Please make sure you discuss any special needs or reasonable adjustments to be considered
during the assessment (refer to the Reasonable Adjustments Strategy Matrix and negotiate
these with your trainer/assessor).
 Please make sure that you have access to a computer and the internet (if you prefer to type
the answers).
 Please ensure that you have all the required resources needed to complete this Unit
Assessment Task (UAT).
 Due date of this assessment task is according to your timetable.
 In exceptional (compelling and compassionate) circumstances, an extension to submit an
assessment can be granted by the trainer/assessor.
 Evidence of the compelling and compassionate circumstances must be provided together
with your request for an extension to submit your assessment work.
 Request for an extension to submit your assessment work must be made before the due date
of this assessment task.

Section 2: Reasonable adjustments


 Students with carer responsibilities, cultural or religious obligations, English as an additional
language, disability etc. can request for reasonable adjustments.
 Please note, academic standards of the unit/course will not be lowered to accommodate the
needs of any student, but there is a requirement to be flexible about the way in which it is
delivered or assessed.
 The Disability Standards for Education requires institutions to take reasonable steps to
enable the student with a disability to participate in education on the same basis as a
student without a disability.
 Trainer/Assessor must complete the section below “Reasonable Adjustment Strategies
Matrix” to ensure the explanation and correct strategy have been recorded and
implemented.
 Trainer/Assessor must notify the administration/compliance and quality assurance
department for any reasonable adjustments made.
 All evidence and supplementary documentation must be submitted with the assessment
pack to the administration/compliance and quality assurance department.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 7 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Reasonable Adjustment Strategies Matrix (Trainer/Assessor to complete)
Category Possible Issue Reasonable Adjustment Strategy
(select as applicable)
 LLN  Speaking  Verbal assessment
 Reading  Presentations
 Writing  Demonstration of a skill
 Confidence  Use of diagrams
 Use of supporting documents such as wordlists
 Non-  Speaking  Discuss with the student and supervisor (if applicable)
English  Reading whether language, literacy and numeracy are likely to
Speaking  Writing impact on the assessment process
Background
 Cultural  Use methods that do not require a higher level of
background language or literacy than is required to perform the job
 Confidence role
 Use short sentences that do not contain large amounts
of information
 Clarify information by rephrasing, confirm
understanding
 Read any printed information to the student
 Use graphics, pictures and colour coding instead of, or
to support, text
 Offer to write down, or have someone else write, oral
responses given by the student
 Ensure that the time available to complete the
assessment, while meeting enterprise requirements, takes
account of the student’s needs
  Knowledge and  Culturally appropriate training
Indigenous understanding  Explore understanding of concepts and practical
 Flexibility application through oral assessment
 Services  Flexible delivery
 Inappropriate  Using group rather than individual assessments
training and  Assessment through completion of practical tasks in the
assessment field after demonstration of skills and knowledge.
 Age  Educational  Make sure font size is not too small
background  Trainer/Assessor should refer to the
 Limited study student’s experience
skills  Ensure that the time available to complete the
assessment takes account of the student’s needs
 Provision of information or course materials in
accessible format.
 Changes in teaching practices, e.g. wearing an FM
microphone to enable a student to hear lectures
 Supply of specialised equipment or services, e.g. a note-
taker for a student who cannot write
 Changes in lecture schedules and arrangements, e.g.
relocating classes to an accessible venue
 Changes to course design, e.g. substituting an
Australian Training School trading as Southern Academy of Business and Technology
Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 8 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Reasonable Adjustment Strategies Matrix (Trainer/Assessor to complete)
Category Possible Issue Reasonable Adjustment Strategy
(select as applicable)
assessment task
 Modifications to physical environment, e.g. installing
lever taps, building ramps, installing a lift
  Reading  Discuss with the Student previous learning experience
Educational  Writing  Ensure learning and assessment methods meet the
background
 Numeracy student’s individual need
 Limited study
skills and/or
learning strategies
 Disability  Speaking  Identify the issues
 Reading  Create a climate of support
 Writing  Ensure access to support that the student has agreed to
 Numeracy  Appropriately structure the assessment
 Limited study  Provide information or course materials in accessible
skills and/or format, e.g. a textbook in braille
learning strategies  Changes in teaching practices, e.g. wearing an FM
microphone to enable a student to hear lectures
 Supply of specialised equipment or services, e.g. a note-
taker for a student who cannot write
 Changes in lecture schedules and arrangements, e.g.
relocating classes to an accessible venue
 Changes to course design, e.g. substituting an
assessment task
 Modifications to physical environment, e.g. installing
lever taps, building ramps, installing a lift

Explanation of reasonable adjustments strategy used (If required)

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 9 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Unit Assessment Task (UAT)
Assessment Task 1 - Unit Knowledge Test (UKT)

Assessment type:
 Written Questions

Assessment task description:


 This is the first (1) unit assessment task you have to successfully complete to be deemed
competent in this unit of competency.
 The Unit Knowledge Test is comprised of twenty (20) written questions
 You must respond to all questions and submit them to your Trainer/Assessor.
 You must answer all questions to the required level, e.g. provide the number of points, to be
deemed satisfactory in this task
 You will receive your feedback within two weeks - you will be notified by your
Trainer/Assessor when results are available.

Applicable conditions:
 All knowledge tests are untimed and are conducted as open book tests (this means you are
able to refer to your textbook during the test).
 You must read and respond to all questions.
 You may handwrite/use computers to answer the questions.
 You must complete the task independently.
 No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
 As you complete this assessment task you are predominately demonstrating your written
skills and knowledge to your trainer/assessor.
 The trainer/assessor may ask you relevant questions on this assessment task to ensure that
this is your own work.

Resubmissions and reattempts:


 Where a student’s answers are deemed not satisfactory after the first attempt, a
resubmission attempt will be allowed.
 You must speak to your Trainer/Assessor if you have any difficulty in completing this task and
require reasonable adjustments (e.g. can be given as an oral assessment)
 For more information, please refer to your RTO Student Handbook.

Location:
 This assessment task may be completed in a learning management system (i.e. Moodle) or
independent learning environment.
 Your trainer/assessor will provide you further information regarding the location for
completing this assessment task.

Instructions for answering written questions:


 Complete a written assessment consisting of a series of questions.
 You will be required to correctly answer all the questions.
 Do not start answering questions without understanding what is required from you. Read the
questions carefully and critically analyse them for a few seconds, this will help you to identify
what is really needed.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 10 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 Your answers must demonstrate an understanding and application of relevant concepts,
critical thinking, and good writing skills.
 Be concise to the point and write answers according to the given word-limit to each question
and do not provide irrelevant information. Be careful, quantity is not quality.
 Be careful to use non-discriminatory language. The language used should not devalue,
demean, or exclude individuals or groups on the basis of attributes such as gender, disability,
culture, race, religion, sexual preference or age. Gender inclusive language should be used.
 When you quote, paraphrase, summarise or copy information from the sources you are using
to write your answers/research your work, you must always acknowledge the source.

How your trainer/assessor will assess your work?


 This assessment task requires the student to answer all the questions.
 Answers must demonstrate the student’s understanding and knowledge of the unit.
 If all assessment tasks are deemed Satisfactory (S), then the unit outcome is Competent (C).
 If at least one of the assessment task is deemed Not Satisfactory (NS), then the unit outcome
is Not Yet Competent (NYC).
 Once all assessment tasks allocated to this Unit of Competency have been undertaken,
trainer/assessor will complete an Assessment plan to record the unit outcome. The outcome
will be either Competent (C) or Not Yet Competent (NYC).
 The “Assessment Plan” is available with the Unit Assessment Pack (UAP) – Cover Sheet.

Purpose of the assessment task:

 The purpose of this assessment task is to assess the students’ knowledge required for the
designing and implementation of a network server.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 11 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Assessment Task 1 - Unit Knowledge Test (UKT)
Instructions:
 This is an individual assessment.

The purpose of this assessment task is to assess the students’ knowledge required to ensure secure
file encryption is selected, implemented and monitored on a computer network or local
environment.
 To make full and satisfactory responses you should consult a range of learning resources,
other information such as handouts and textbooks, learners’ resources and slides.
 All questions must be answered in order to gain competency for this assessment.
 You may attach a separate sheet if required.
 You must include the following particulars in the footer section of each page of the attached
sheets:
o Student ID or Student Name
o Unit ID or Unit Code
o Course ID or Course Code
o Trainer and assessor name
o Page numbers
 You must staple the loose sheets together along with the cover page.
 You must attach the loose sheets chronologically as per the page numbers.
 Correction fluid and tape are not permitted. Please do any corrections by striking through
the incorrect words with one or two lines and rewriting the correct words.

Resources required to complete the assessment task:

 Learner guide
 PowerPoint presentation
 Unit Assessment Pack (UAP)
 Access to other learning materials such as textbooks
 Access to a computer, the Internet and word-processing system such as MS Word.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 12 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Question 1: Answer the following questions:
A. Explain the features required for Network Operating System (NOS). Write your answer in
100-150 words.
B. What are the two (2) latest server applications compatibility issues and their resolution
procedures? Write your answer in 100-150 words.

A network operating system is an operating system designed for the sole purpose of
supporting workstations, database sharing, application sharing and file and printer access
sharing among multiple computers in a network. Certain standalone operating systems, such
as Microsoft Windows NT and Digital’s OpenVMS, come with multipurpose capabilities and
can also act as network operating systems. SUPPORT The first characteristic of network
operating systems is the support component. Network operating systems provide support for
the multiple processors, applications, and hardware devices that make up a network. The
systems support the users accessing the network as well as process requests for specific
documents and usage of hardware. NOSs also provide protocol requests from users,
including Transmission Control Protocol/Internet Protocol (TCP/IP) and other protocols.
Controls Support The second characteristic of network operating systems is the security
component. NOSs manage the authorization and authentication of users, computer
workstations, and other devices accessing a network. Irfan intruder tries to access a
network, the NOS blocks the unauthorized user/computer and logs the intrusion attempt
within its log files. The NOS also manages software and hardware installations to keep users
from installing unauthorized software and devices.
Setup The third characteristic of network operating systems is the user setup component.
Network operating systems create user accounts and manage the user logging into and out
of the network. The systems also manage what file and directory services a specific user has
access to, users accessing the network remotely, and how the networks graphical interface
looks to specific users.
Printing and File Services The fourth characteristic of network operating systems is the
printing and file services component. Like other operating systems, network operating
systems manage all printing, storage, backup, and duplication services for computers and
users accessing a network. The systems also control access to the Internet, local-area
(LAN) and wide-area networks (WAN), port routing, and internal web services known as
Intranet. An NOS filters documents and files through the printing/file services immediately.
More than one user can send documents and files through the network for printing, backing
up, or other types of processing.
EMAIL SERVICES The Fifth and final characteristic of network operating systems is the
email component. An NOS manages electronic mail, also known as email, for the entire
network, including users accessing the NOS remotely and from the Internet. The NOS
blocks SPAM and other problematic emails and sends/receives email, as well as lets user use.
Software compatibility can refer to the compatibility that a particular software has running on
a particular CPU architecture such as Intel or PowerPC. Software compatibility can also refer
to ability for the software to run on a particular operating system. Very rarely is a compiled
software compatible with multiple different CPU architectures. Normally, an application is
compiled for different CPU architectures and operating systems to allow it to be compatible

with the different system. Interpreted software, on the other hand, can normally run on many
different CPU architectures and operating systems if the interpreter is available for the
architecture or operating system. Software incompatibility occurs many times for new
software released for a newer version of an operating system which is incompatible with the
older version of the operating system because it may miss some of the features and

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 13 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


functionality that the software depends on.
Hardware compatibility
Hardware compatibility can refer to the compatibility of computer hardware components with
a particular CPU architecture, bus, motherboard or operating system. Hardware that is
compatible may not always run at its highest stated performance, but it can nevertheless
work with legacy components. An example is RAM chips, some of which can run at a lower
(or sometimes higher) clock rate than rated. Hardware that was designed for one operating
system may not work for another, if device or kernel drivers are unavailable. For example,
much of the hardware for Mac OS X is proprietary hardware with drivers unavailable for use
in operating systems such as Linux.

Resolution procedures: Using the Program Compatibility Wizard


The Program Compatibility Wizard is a simple application that detects issues on your PC
and can automatically fix them for you. Or, if the wizard detect an issue, you can
simply point it at the misbehaving application and have it do its thing, using recommended
settings or a manual troubleshooting process.

Question 2: Summarise the following network service configurations:


A. Domain name system (DNS)
B. Dynamic host configuration protocol (DHCP)
C. File transfer protocol (FTP)
D. Mail
E. Network time protocol (NTP)
F. Proxy
G. Server messages block (SMB)
H. Web
Write 50 to 100 words for each of the configuration.

DNS: The Domain Name System (DNS) is the phonebook of the Internet. People get to data online
through space names, as nytimes.com or espn.com. Internet browsers connect through Internet
Protocol (IP) addresses. DNS makes an interpretation of area names to IP addresses so programs
can stack Internet assets. Every gadget associated with the Internet has a remarkable IP address
which different machines use to discover the gadget. DNS servers kill the requirement for people
to retain IP tends to, for example, 192.168.1.1 (in IPv4), or more mind boggling more up to date
alphanumeric IP addresses.

DHCP: Every gadget on a TCP/IP-based system must have an interesting unicast IP deliver to get to
the system and its assets. Without DHCP, IP addresses for new PCs or PCs that are moved starting

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 14 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


with one subnet then onto the next must be designed physically; IP addresses for PCs that are
expelled from the system must be physically recovered.

With DHCP, this whole procedure is computerized and overseen halfway. The DHCP server keeps
up a pool of IP locations and leases a deliver to any DHCP-empowered customer when it begins up
on the system. Since the IP addresses are dynamic (rented) as opposed to static (forever doled
out), addresses never again being used are consequently come back to the pool for reallocation.

FTP: The File Transfer Protocol (FTP) is a standard system convention utilized for the exchange of
PC records between a customer and server on a PC organize. FTP is based on a customer server
show engineering separate control and information associations between the customer and the
server. FTP clients may verify themselves with an unmistakable textsign-in convention, typically as
a username and secret phrase, yet can associate namelessly if the server is designed to permit it.
For secure transmission that ensures the username and secret word, and scrambles the substance,
FTP is frequently anchored with SSL/TLS (FTPS) or supplanted with SSH File Transfer Protocol
(SFTP). The primary FTP customer applications were direction line programs created before
working frameworks had graphical UIs, are still delivered with most Windows, Unix, and Linux
working frameworks.

Mail: E-mail (electronic mail) is the trading of PC put away messages by media transmission. (A few
productions spell it email; we incline toward the as of now more settled spelling of email.) E-mail
messages are normally encoded in ASCII content. Be that as it may, you can likewise send non-
content records, for example, realistic pictures and sound documents, as connections sent in
twofold streams. Email was one of the principal employments of the Internet is as yet the most
prominent utilize. A vast level of the aggregate movement over the Internet is email. Email can
likewise be traded between online specialist co-op clients and in systems other than the Internet,
both open and private.

System Time Protocol (NTP): It is a systems administration convention for clock synchronization
between PC frameworks over bundle exchanged, variable-dormancy information systems. In
activity since before 1985, NTP is one of the most seasoned Internet conventions in flow utilize.
NTP was planned by David L. Factories of the University of Delaware.

NTP is planned to synchronize every single taking an interest PC to inside a couple of milliseconds
of Coordinated Universal Time (UTC).It utilizes the crossing point calculation, a changed form of
Marzullo's calculation, to choose precise time servers and is intended to alleviate the impacts of
variable system dormancy. NTP can as a rule keep up time to inside several milliseconds over
general society Internet, and can accomplish superior to one millisecond precision in
neighborhood under perfect conditions. Unbalanced courses and system clog can cause blunders
of 100 ms or more.The convention is normally portrayed as far as a customer server demonstrate,
yet can as effectively be utilized in shared connections where the two companions view alternate
as a potential time source.

Intermediary: In PC organizes, an intermediary server is a server (a PC framework or an


application) that goes about as a middle person for demands from customers looking for assets
from other servers.[1]A customer associates with the intermediary server, asking for some
administration, for example, a record, association, page, or other asset accessible from an
alternate server and the intermediary server assesses the demand as an approach to rearrange
and control its multifaceted nature. Intermediaries were developed to add structure and epitome
to disseminated systems.[2] Today, most intermediaries are web intermediaries, encouraging
access to content on the World Wide Web, giving obscurity and might be utilized to sidestep IP

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 15 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


address blocking.

SMB: In PC organizing, Server Message Block (SMB), one rendition of which was otherwise called
Common Internet File System (CIFS,/sɪfs/) works as an application-layer arrange convention.
Predominantly utilized for giving shared access to records, printers, and serial ports and random
correspondences between hubs on a system. It additionally gives a validated between process
correspondence component. Most use of SMB includes PCs running Microsoft Windows, where it
was known as "Microsoft Windows Network" before the presentation of Active Directory. Relating
Windows administrations are LAN Manager Server (for the server segment) and LAN Manager
Workstation (for the customer segment).

WEB: The Web is the regular name for the World Wide Web, a subset of the Internet comprising
of the pages that can be gotten to by a Web program. Numerous individuals accept that the Web
is the same as the Internet, and utilize these terms conversely. Be that as it may, the term Internet
really alludes to the worldwide system of servers that makes the data sharing that occurs over the
Web conceivable. Thus, despite the fact that the Web makes up a vast bit of the Internet, however
they are not one and same.

Question 3: Explain the following network service management terms:


A. Start
B. Stop
C. Restart
D. Start on boot
Write your response in 150-200 words

Start: Start is called on the frame when a script is enabled just before any of
the Update methods are called the first time. Like the Awake function, Start is
called exactly once in the lifetime of the script. However, Awake is called when
the script object is initialised, regardless of whether or not the script is
enabled. Start may not be called on the same frame as Awake if the script is
not enabled at initialisation time.

Stop: Use these functions to return a warning or error from another function.
The warning function will output a message after a function finishes, while
the stop function both stops the execution of the function and outputs an error
message.

Restart: Use the RESTART command to restart a function in the RACF

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 16 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


subsystem address space. The RESTART command can be used after you apply
maintenance and to recover from failures. The RESTART command ends the
current subtask and starts a new one. Only one function can be restarted with
a single RESTART command, but that function might involve multiple subtasks.

Start on boot: In computing, booting is starting up a computer or computer


appliance until it can be used. It can be initiated by hardware such as a button
press or by software command. After the power is switched on, the computer is
relatively dumb and can read only part of its storage called read-only memory.
There, a small program is stored called firmware. It does power-on self-tests and,
most importantly, allows accessing other types of memory like a hard
disk and main memory.

Question 4: Answer the following questions:


A. What are the five (5) essential features of network service security? Write your answer in
150-200 words.
B. What are the steps involved in configuring server firewall on Windows server 2012?

Identity
Accurate and positive identification of network users, hosts, applications,
services, and resources is a must. Kerberos, password tools, and protocols such
as RADIUS and TACACS+ enable identification.
Perimeter security
This enables you to control access to network applications, data, and services
so only authorised users and information can pass through the network.
Data privacy
Data privacy is the providing of confidential data on command to authorised
users while protecting that information from eavesdropping or tampering.
Tunnelling, encryption technologies, and protocols like IPSec provide important
protection when implementing Virtual Private Networks (VPNs).
Security monitoring
You also should regularly test and monitor security preparations. By being
proactive, you can identify areas of weakness and make adjustments. When a
real security event occurs, you’ll be ready.
Policy management
It’s likely your network will grow in size and complexity. You’ll need centralised
policy-management tools that use directory services to grow with the network.
These tools define, distribute, enforce, and audit the security policy through
browser interfaces, plus they enhance the usability and effectiveness of your

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 17 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


network’s security solutions.

B: The Windows Firewall with Advanced Security is a host-based firewall that


runs on Windows Server 2012 and is turned on by default. Firewall settings
within Windows Server 2012 are managed from within the Windows Firewall
Microsoft Management Console (MMC). To review and set the Windows Firewall
settings, perform the following steps:

1. Open the Server Manager from the task bar.


2. On the right-hand side in the top navigation bar, click Tools and select Windows
Firewall with Advanced Security.
3. Review the current configuration settings by selecting Windows Firewall
Properties from the MMC landing page. You can access and modify the settings
for each of the three firewall profiles, Domain, Private, and Public, as well as
IPSec settings.

Question 5: Answer the following questions.

A. What are the two (2) network troubleshooting tools and techniques? Write your
response in 100-150 words.

B. What are the five (5) network diagnostic utilities? Write 30-50 words for each.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 18 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


A. Ipconfig/ifconfig

One of the most important things that must be completed when troubleshooting a

networking issue is to find out the specific IP configuration of the variously affected

hosts. Sometimes this information is already known when addressing is configured

statically, but when a dynamic addressing method is used, the IP address of each

host can potentially change often. The utilities that can be used to find out this IP

configuration information include the ipconfig utility on Windows machines and the

ifconfig utility on Linux/*nix based machines. Figure 3 below shows an example of

the ifconfig utility showing the IP configuration information of a queries host.

Ping

The most commonly used network tool is the ping utility. This utility is used to

provide a basic connectivity test between the requesting host and a

destination host. This is done by using the Internet Control Message Protocol

(ICMP) which has the ability to send an echo packet to a destination host and a

mechanism to listen for a response from this host. Simply stated, if the

requesting host receives a response from the destination host, this host is

reachable. This utility is commonly used to provide a basic picture of where a

specific networking problem may exist. For example, if an Internet connection

is down at an office, the ping utility can be used to figure out whether the

problem exists within the office or within the network of the Internet provider.

Figure 1 below shows an example of the ping utility being used to obtain the

reachability status of the locally connected router.

B. Diagnostic Tools is a collection of generic utilities, for day-to-day


management of the system and network. The tools can be used to
troubleshoot, debug connectivity issues, packet loss and latency in a LAN
environment.

The following are the tools available in this group

Ping : Utility to determine whether a specific IP is accessible in the network. It


helps in discovery of the status of a network device; whether the device is
alive or not. Before you ping a device you can configure the ping settings like
number of packets, time to live, size, and timeout.

Ping Scan : Utility to scan a range of IP's to check if the given range of IP
Australian Training School trading as Southern Academy of Business and Technology
Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 19 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


addresses are accessible. The tool displays the IP Address, the response time,
and the DNS name of the discovered device. This tool uses the basic PING
function as a base to perform the scan.

SNMP Ping : Utility to check if a specific IP is SNMP enabled. It helps the


network engineers to know the availability of a device and also provides basic
information like DNS name, system name, location, system type, and system
description. Following the SNMP discovery, if required, more details of the node
can be retrieved using SNMP Tools like SNMP walker, MIB Browser and SNMP
Graph

SNMP Scan : Utility to scan a range of IP addresses to check if the IP Addresses


are SNMP enabled or not. The tool displays the IP address, response time, DNS
name, system name, and system type.

Trace Route : Utility to record the route (route is calculated in terms of hops, i.e
number of routers it crosses) through the network between the sender's IP and
a specified destination IP. The user can configure the settings such as number
of hops, and timeout value.

Question 6: Answer the following questions.

A. Briefly explain the importance of the following installation media in 30-50 words each.
a. CD
b. DVD
c. universal serial bus (USB)
d. boot disk
e. network and script (automated install)
f. deployment services
B. Briefly explain boot process and diagnosing boot failures related to network server. Answer
in 50-100 words.
C. Briefly explain operating system rescue environment related to network server. Answer in 50-
100 words.

a. CD:

A compact disc is a portable storage medium that can be used to record, store and
play back audio, video and other data in digital form. A standard compact disc
measures 4.7 inches, or 120 millimeters (mm), across, is 1.2 mm thick, weighs
between 15 grams and 20 grams, and has a capacity of 80 minutes of audio, or
650 megabytes (MB) to 700 MB of data.

b. DVD:

DVD is an optical disc technology with a 4.7 gigabyte storage capacity on a single-

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 20 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


sided, one-layered disk, which is enough for a 133-minute movie. DVDs can be
single- or double-sided, and can have two layers on each side; a double-sided, two-
layered DVD will hold up to 17 gigabytes of video, audio, or other information. This
compares to 650 megabytes (.65 gigabyte) of storage for a CD-ROM disk.

c. universal serial bus (USB):

A Universal Serial Bus (USB) is a common interface that enables communication


between devices and a host controller such as a personal computer (PC). It
connects peripheral devices such as digital cameras, mice, keyboards, printers,
scanners, media devices, external hard drivesand flash drives. Because of its wide
variety of uses, including support for electrical power, the USB has replaced a wide
range of interfaces like the parallel and serial port.
A USB is intended to enhance plug-and-play and allow hot swapping. Plug-and-play
enables the operating system (OS) to spontaneously configure and discover a new
peripheral device without having to restart the computer.

d. boot disk:

A boot disk is a removable data storage medium used to load and boot
an operating system or utility program. Typically, a boot disc is a read-only
medium that stores temporary files on a CD-ROM or floppy disc drive. Other boot
disk mediums include USB drives, zip drives, and paper tape drives.

One of the most common uses of a boot disk is to start the computer when the
operating on the internal hard drive does not load. Generally, a boot disk contains
a full-scale operating system, and may include a small utility operating system as
well. In recent years, boot disks have become less common as original equipment
manufacturers turn to using hard drive partitions to store recovery data.

e. network and script (automated install):

A script is sometimes used to mean a list of operating system commands that


are prestored in a file and performed sequentially by the operating system's
command interpreter whenever the list name is entered as a single command.
Multimedia development programs use "script" to mean the sequence of
instructions that you enter to indicate how a multimedia sequence of
files will be presented

f. deployment services:

Windows Deployment Services is a server role that gives administrators the ability

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 21 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


to deploy Windows operating systems remotely. WDS can be used for network-
based installations to set up new computers so administrators do not have to
directly install each operating system (OS). If an administrators is thinking of using
WDS, Microsoft recommends having a good understanding of common networking
components and deployment technologies, including Active Directory Domain
Services, DNSand DHCP.

B) Booting or loading an operating system is different than installing it, which is


generally an initial one-time activity. (Those who buy a computer with an operating
system already installed don't have to worry about that.) When you install the
operating system, you may be asked to identify certain options or configuration
choices. At the end of installation, your operating system is on your hard disk
ready to be booted (loaded) into random access memory, the computer storage
that is closer to the microprocessor and faster to work with than the hard disk.
Typically, when an operating system is installed, it is set up so that when you turn
the computer on, the system is automatically booted as well. If you run out of
storage (memory) or the operating system or an application program encounters
an error, you may get an error message or your screen may "freeze" (you can't do
anything). In these events, you may have to reboot the operating system.

Diagnosing PC bootup problems can be the most difficult of tasks for several
reasons. Diagnosis requires logical reasoning, which in itself requires that the
person doing the diagnosis understand the system events that are supposed to
occur, and in which order. Further, many of the clues that might be available
require specialized diagnostic equipment that the average user does not possess.
Fortunately, even without the use of diagnostic tools, the most common boot-time
errors can be resolved by with a little knowledge, a few common components and
a bit of patience.
The BIOS (Basic I/O System) is the very first program run by the PC, and resides in
a ROM chip (Read Only Memory), which is also called Non-Volatile memory. The
BIOS program initializes the standard devices, such as the memory controller,
video controller, IDE controller and floppy controller. Using stored parameters, it
initializes the motherboard chipset, and sets timing parameters. It also creates an
interrupt vector table and provides a set of services, accessible through interrupts,
that allow access to the standard I/O devices. Following is a brief description of the
entire PC boot process, which can be extremely helpful in identifying and resolving
problems.

C) Rescue mode is a term used to describe a method of booting a small Linux


environment completely from diskettes.

What follows in this section may help you recover from a problem at some point?
A copy of these instructions is also available as rescue.txt on your Red Hat Linux
6.0 CD-ROM.

As the name implies, rescue mode is there to rescue you from something. In

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 22 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


normal operation, your Red Hat Linux system uses files located on your system's
hard drive to do everything -- run programs, store your files, and more.

However, there may be times when you are unable to get Linux running
completely enough to access its files on your system's hard drive. By using rescue
mode, it's possible to access the files stored on your system's hard drive, even if
you can't actually run Linux from that hard drive

Question 7: Answer the following questions.

A. Briefly explain the importance of operating system help and support utilities in network
server environment. Answer in 50-100 words.
B. Briefly explain two performance monitoring tools and tuning options related to Windows
server 2012. Answer in 50- 100 words.
C. Briefly explain two compatibility issues and resolution procedures related to Windows server
2012.
D. List and explain three high availability options for servers. Answer in 50-100 words.
E. Briefly explain file and print management in 50-100 words.

A) All computers ship with software called an operating system (O/S) to manage all
the software and hardware on the computer and to provide an interface that humans
can use to interact with the machines. A modern O/S contains much built-in software
designed to simplify the networking of a computer. Typical O/S software includes an
implementation of TCP/IP protocol stack and related utility programs like ping and
traceroute, along with the necessary device drivers and other software to
automatically enable a device's Ethernet or wireless interface. The operating
systems of mobile devices normally provide the programs needed to enable Wi-
Fi, Bluetooth or other wireless connectivity. operating system specifically designed
to run on servers, which are specialized computers that operate within
a client/server architecture to serve the requests of client computers on the network.
The server operating system, or server OS, is the software layer on top of which
other software programs, or applications, can run on the server hardware. Server
operating systems help enable and facilitate typical server roles such as Web server,
mail server, file server, database server, application server and print server.

B)

Tool Description

SQL Server Microsoft SQL Server Distributed Replay can use multiple computers to repla

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 23 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Tool Description

Distributed simulating a mission-critical workload.


Replay

Monitor System Monitor primarily tracks resource usage, such as the number of buff
Resource Usage requests in use, enabling you to monitor server performance and activity us
(System and counters or user-defined counters to monitor events. System Monitor (P
Monitor) Microsoft Windows NT 4.0) collects counts and rates rather than data about
example, memory usage, number of active transactions, number of blocked
activity). You can set thresholds on specific counters to generate alerts that

System Monitor works on Microsoft Windows Server and Windows operating


monitor (remotely or locally) an instance of SQL Server on Windows NT 4.0 o

The key difference between SQL Server Profiler and System Monitor is that S
monitors Database Engine events, whereas System Monitor monitors resour
with server processes.

C) Two (2) Windows Server 2016 compatibility issues and their resolution procedures
are:
Server Core installation option: When you install Windows Server 2016 by
using the Server Core installation option, the print spooler is installed and
starts by default even when the Print Server role is not installed.
To avoid this, after the first boot, set the print spooler to disabled.

Remote Server Administration Tools (RSAT): If you are running a version of


Windows 10 older than the Anniversary Update, and are using Hyper-V and
virtual machines with an enabled virtual Trusted Platform Module (including
shielded virtual machines), and then install the version of RSAT provided for
Windows Server 2016, attempts to start those virtual machines will fail.
To avoid this, upgrade the client computer to Windows 10 Anniversary Update (or
later) prior to installing RSAT. If this has already occurred, uninstall RSAT,
upgrade the client to Window Anniversary Update, and then reinstall RSAT.
D)Three high availability options for servers are :
Ultra High Performance Dedicated Servers

High performance servers are high-end dedicated solutions with larger


computing capacity, especially designed to achieve the maximum performance.
They are an ideal solution to cater enterprise workloads.

A typical high performance dedicated server will consist of the following:

1. Single/Dual latest Intel Xeon E3 or E5 series processors.


2. 64 GB to 256 GB RAM
3. 8 to 24 TB SATA II HDD with RAID 10

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 24 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


4. Energy efficient and redundant power supply & cooling units
5. Offsite Backups

Real World Applications:

One of our existing customers was looking for a high-end game server to host
flash games with encoded PHP and MySQL server as a backend.

To achieve the highest availability, they demanded 2 load balancers with failover.
Each of them contains 2 web servers and a database server

Load Balancing
The process of distributing incoming web traffic across a group of servers efficiently
and without intervention is called Load Balancing. A hardware or software appliance
which provides this load balancing functionality is known as a Load Balancer. A load
balancer sits in front of your servers and routes the visitor requests across the
servers. It ensures even distribution, i.e., all requests must be fulfilled in a way that it
maximizes speed and capacity utilization of all servers and none of them is over or
under-utilized.

E)Print servers are used provide access to printers across the network. They offer an
added level of manageability for network printing and allow an administrator to
control when print devices can be used by scheduling the availability of printers,
setting priority for print jobs and configuring printer properties. An administrator can
also view, pause, resume, and/or delete print jobs and manage printers remotely and
by using Windows Management Instrumentation (WMI), which allows an
administrator to manage components like print servers and print devices from the
command line.

File servers are used to store data in a central location, so they must be kept secure
to ensure that only those who are authorised are able to use the files. The volumes
on a file server should be formatted with NTFS to allow file and folder permissions to
be set and the Encrypting File System (EFS) should be used to guard against
unauthorised users and malicious programs. Although encryption and decryption can
be complex, EFS file encryption is completely transparent to the user. However, you
cannot encrypt system files and you cannot share encrypted. Encrypted files cannot
be compressed and compressed files will be decompressed when you encrypt them.
File servers allow users to store their files remotely, rather than on their local hard
disks, and share them with other users. When a file is saved to a file server, clients
who have access to the relevant directory can access it remotely. File servers are
also important when multiple employees use network-accessible applications and
data may need to be saved to a shared database, spreadsheet or other type of file

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 25 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


The Distributed File Service (Dfs) can be implemented to enable users to access
shared files. Dfs allows data located on different volumes, shares or servers appear
as if everything resides in the same location. This makes it easier for users to find
data as they do not need to search through multiple locations to access the files they
require. Files that are being printed may also require protection

Question 8: Answer the following questions.


A. Explain user authentication and directory services for the network server. Answer in 50-100
words.
B. Explain the steps you will follow to implement backup and restore functions on the network
server. Answer in 150-200 words.
C. In your own words, explain error and event logging and reporting. Answer in 50-100 words.
D. Briefly explain file systems and disk partitioning schemes in 50-100 words.

User authentication is performed in almost all human-to-computer interactions


other than guest and automatically logged in accounts. Authentication
authorizes human-to-machine interactions on both wired and wireless
networks to enable access to networked and Internet connected systems.
Traditionally, user authentication has typically consisted of a simple ID and
password combination. Increasingly, however, more authentication factors are
added to improve the security of communications.

In computing, directory service or name service is a mapping between the


names of resources in a network and their respective network addresses. It is a
shared information infrastructure for locating, managing, administering and
organizing everyday items and network resources, which can include volumes,
folders, files, printers, users, groups, devices, telephone numbers and other
objects. A directory service is a critical component of a network operating
system. A directory server or name server is a server which provides such a
service. Each resource on the network is considered an object by the directory
server. Information about a particular resource is stored as a collection

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 26 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


of attributes associated with that resource or object.
A directory service defines a namespace for the network. The namespace is
used to assign a name (unique identifier) to each of the objects. Directories
typically have a set of rules determining how network resources are named
and identified, which usually includes a requirement that the identifiers be
unique and unambiguous. When using a directory service, a user does not
have to remember the physical address of a network resource; providing a
name locates the resource. Some directory services include access
control provisions, limiting the availability of directory information to
authorized users.

 C) Windows reporting: Windows reporting is a crash reporting technology


introduced by Microsoft with Windows XP and included in later Windows
versions and Windows Mobile5.0 and 6.0. Not to be confused with
the debugging tool which left the memory dump on the user's local machine,
Windows Error Reporting collects and offers to send post-error debug
information (a memory dump) using the Internet to the Microsoft or stops
responding on a user's desktop. No data is sent without the user's consent.
[2]
When a dump (or other error signature information) reaches the Microsoft
server, it is analysed and a solution is sent back to the user when one is
available. Solutions are served using Windows Error Reporting Responses.
Windows Error Reporting runs as a Windows service and can optionally be
entirely disabled. If Windows Error Reporting itself crashes, then an error report
that the original crashed process produced cannot be sent at all. Windows
event logging: MS Windows 2000, XP and 2003 typically maintain three Event
Log files: Application, System, and Security. They are generally found in the
C:\Windows\system32\config directory. Server versions of the OS may maintain
additional Event Logs (DNS Server.evt, Directory Service.evt, File Replication
Service.evt) depending upon the functionality of the server.
Each log file consists of a Header record and the Body. The body again consists of
Event records, the Cursor record and unused space. The body could form a ring
buffer, where the cursor record will mark the border between the oldest and the
newest event record. Unused space could be empty, slack and padding
D) A file system is a process that manages how and where data on a storage
disk, typically a hard disk drive (HDD), is stored, accessed and managed. It is a
logical disk component that manages a disk's internal operations as it relates
to a computer and is abstract to a human user. Regardless of type and usage,
a disk contains a file system and information about where disk data is stored
and how it may be accessed by a user or application. A file system typically
manages operations, such as storage management, file naming,
directories/folders, metadata, access rules and privileges.
Commonly used file systems include File Allocation Table 32 (FAT 32), New
Technology File System (NTFS) and Hierarchical File System (HFS)

Disk partition is really only a logical separation from the whole drive, but
it appears as though the division creates multiple physical drives. Some terms
you'll see associated with a partition include primary, active, extended, and
logical partitions. More on this below. Partitions are also sometimes called disk
partitions and when someone uses the word drive, they usually mean a
partition with a drive letter assigned. Dividing a hard drive into partitions is
Australian Training School trading as Southern Academy of Business and Technology
Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 27 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


helpful for a number of reasons but is necessary for at least one: to make the
drive available to an operating system.

For example, when you install an operating system like Windows, part of the
process is to define a partition on the hard drive. This partition serves to define an
area of the hard drive that Windows can use to install all of its files. In Windows
operating systems, this primary partition is usually assigned the drive letter of "C".

In addition to the C drive, Windows often automatically builds other partitions


during installation, even though they rarely get a drive letter. For example, in
Windows 10, a recovery partition, with a set of tools called Advanced Startup
Options, is installed so you can fix problems that might occur on the main C drive.

B)About Backing up Data


All data is critical and has to be backed up. There is no data which can be considered non-critical
and hence not be backed up. Network Integrity backs up the following information:
• Database information
This type of data is database driven or database specific. Following are the database information
types:
o Network Integrity tablespaces: contains information on configuration, scans, and
discrepancies along with Network Integrity configuration. This information can be viewed using
the Mbean console.
o ESS tablespaces: contains information on scheduled jobs for scheduler or blackout.
o ESS metadata store: contains the Applcore database repository for storing scheduled job
definitions. For example, startscanjob, blackoutjob, and stopscanjob.
o WebLogic persistent store: contains information responsible for persisting the scan,
discrepancy, and assimilation of jobs (if a job failure such as a server failure, it ensures that the job
is resumed and completed.)
• Domain configuration
This type of data contains information about the following:
o Connection pool sizes (database, SNMP JCA)
o Workmanager (thread pools) for cartridges
o Security configuration (SSL), security providers (embedded LDAP or Oracle Internet
Directory)
o Other J2EE resources (JMS queues, topics, cluster configuration, and loadbalancing etc)
 Work managers
 GC parameters
 Domain configuration files (set Domainenv.sh and so on)
 Data sources
 Java Message Service (JMS) resource configurations
 Installed applications
• Security provider
This type of data contains users/roles in LDAP provider (embedded LDAP or Oracle Internet
Directory). If you use embedded LDAP, data is backed up as part of WebLogic domain backup. If
you use external LDAP or any other system, you must follow the backup mechanism specifically
mentioned in that software.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 28 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


About Restore in Network Integrity
Restore is a method whereby lost data can be recovered completely. Network Integrity has a
restore feature that works as a recovery strategy for outages that involve actual data loss or
corruption, host failure, or media failure where the host or disk cannot be restarted and are
permanently lost. This type of failure requires some type of data restoration before the Oracle
Fusion Middleware environment can be restarted and continue with normal processing.
Restoring In a Cluster Environment
In a cluster environment, if a Network Integrity adaptor is installed on the Administration server
and the server fails, restore the entire server using a backup.
If a Network Integrity adaptor is installed on a managed server and the server fails, follow these
steps to restore the server:
1. Add a new managed server to the cluster on the same system.
2. Deploy all Network Integrity components on this managed server.

Question 9: Explain the processes involved in managing the project including the following:
A. Documentation skills required for networks
B. Task management
C. Task scheduling utilities.
Write 100-150 words for each in your response.

Create a network documentation policy

A network documentation policy should detail what aspects of a network need to


be documented, especially each server. A documentation policy also
communicates to each administrator exactly what is expected of them regarding
the documentation process.

Create a network topology diagram

Ideally, you want this map of the network's topology to include each network
segment, the routers connecting the various segments, and the servers, gateways
and other major pieces of networking hardware that are connected to each
segment. For larger networks, you may have to create a general segment map and
make more specific maps of each individual segment.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 29 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Document server names, roles and IP addresses

While the information included in a network topology diagram is not necessarily


specific, there is certain information that you should include for each server, even
if that information has to be placed in an appendix. For each server, list the
server's name, its IP address and the role that the server is performing (DNS,
DHCP, mail server, etc.). Keep in mind that a server may be assigned multiple IP
addresses or have multiple NICs, so you should document that information too.

Create a change log for each server

When a server fails, the failure can often be traced to a recent change. As a part of
the network documentation, consider making a log book for each server for
documenting changes such as patch and application installations and modified
security settings. Not only will the log help you troubleshoot future problems, it
can help you rebuild the server in the event of a catastrophic failure.

Document software versions and proof of licenses

Document the applications and their versions running on each server. You might
also include a copy of the software license or a receipt within this documentation
just in case your customer becomes involved in a software audit.

Document hardware components

I have talked about documenting individual servers, but it's equally important to
document switches, routers, gateways and other networking hardware. The
documentation should include information such as:

 How is the device connected to the network?

 How is the device configured?

 Does a backup of the configuration exist?

 What firmware revision is the device running?

 Is the device configured to use a password? (Don't include the actual

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 30 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


password, but you can include a password hint or a reference to the password
being written in a notebook that is stored in the safe.)

Document the Active Directory

few things that should be consider for documenting:

 The names of the domains in the forest.

 The Active Directory site structure.

 Where the various servers exist within the Active Directory hierarchy.

 The location and contents of each group policy.

 Any external trusts that may exist.

Document your backup procedures

Backup is your customer's best defense against a catastrophe, but it will do little
good if nobody can figure out how to use it. Be sure to document the backup
software used and its version (very important). You will also want to document the
tape rotation scheme, a general description of what's included in each backup job
and where the backup tapes are stored.

B) Task management is the process of managing a task through its life cycle. It
involves planning, testing, tracking, and reporting. Task management can help
either individual achieve goals, or groups of individuals collaborate and share
knowledge for the accomplishment of collective goals. Tasks are also
differentiated by complexity, from low to high. Effective task management
requires managing all aspects of a task, including its status, priority, time,
human and financial resources assignments, recurrence, dependency,
notifications and so on. Managing multiple individuals or team tasks may be
assisted by specialized software, for example workflow or project management
software. In fact, many people believe that task management should serve as
a foundation for project management activities.
Task management may form part of project management and process
management and can serve as the foundation for efficient workflow in an
organization. Project managers adhering to task-oriented management have a
detailed and up-to-date project schedule, and are usually good at directing
team members and moving the project forward

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 31 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


A. Task scheduling utilities:

Task Scheduler is a component of Microsoft Windows that provides the


ability to schedule the launch of programs or scripts at pre-defined times or
after specified time intervals: job scheduling (task scheduling). It was first
introduced in the Microsoft Plus! for Windows 95 as System Agent[1] but was
renamed to Task Scheduler in Internet Explorer 4.0 and Windows 98.
The Windows Event Log service must be running before the Task Scheduler
starts up. This service should not be confused with the scheduler that
allocates CPU resources to processes already in memory. Task Scheduler
was introduced with Windows Vista and included in Windows Server
2008 as well. The redesigned Task Scheduler user interface is now based
on Management Console. In addition to running tasks on scheduled times or
specified intervals, Task Scheduler 2.0 also supports calendar and event-
based triggers, such as starting a task when a particular event is logged to
the event log, or when a combination of events has occurred. Also, several
tasks that are triggered by the same event can be configured to run either
simultaneously or in a pre-determined chained sequence of a series of
actions, instead of having to create multiple scheduled tasks. Tasks can also
be configured to run based on system status such as being idle for a pre-
configured amount of time, on tart up, logoff, or only during or for a
specified
time. XPath expressions can be used to filter events from the Windows Event
Log. Tasks can also be delayed for a specified time after the triggering event
has occurred, or repeat until some other event occurs. Actions that need to be
done if a task fails can also be configured. The actions that can be taken in
response to triggers, both event-based as well as time-based, not only include
launching applications but also take a number of custom actions. Task
Scheduler includes a number of actions built-in, spanning a number of
applications; including send an e-mail, show a message box, or fire
a COM handler when it is triggered. Custom actions can also be specified using
the Task Scheduler API. Task Scheduler keeps a history log of all execution
details of all the tasks. Windows Vista uses Task Scheduler to run various
system-level tasks consequently, the Task Scheduler service can no longer be
disabled (except with a simple registry tweak.

Question 10: Answer the following questions:

A: What is the importance of consultation with the key stakeholders and how does it help to
effectively coordinate the task? Write your response in 100-150 words.

B: What is the importance of the Work Health and Safety (WHS) processes and procedures at a
workplace? Write your response in 100-150 words.

The main importance of consultation with the key stakeholders are given below:

 Firstly, decision making will be more informed and in tune with those who the actions will affect.
 Secondly, there will be greater satisfaction from stakeholders with the outcome. Through the
engagement process, those who decisions will affect will feel they have inputted into the final
outcome and that everyone’s views have been taken into account. Depending on the method of
consultation, they will also understand that their perspective may not be shared by all and that there

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 32 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


is a need for compromise.
 This in turn will lead to a greater chance of a successful implementation of the initiative.
Stakeholders will feel ownership of the venture, and are therefore more likely to want the venture to
succeed.
 Finally, consulting with people who will be affected by a development is an example of best practice
It represents good governance and transparency, demonstrates a desire to engage in meaningful
two-way communication, and recognises the important contribution stakeholders at all levels can
make to future changes which will directly or indirectly affect them.

B) Health and safety are two words people tend to take rather seriously – and
understandably so. They play a vital role in your well-being and overall quality
of life. When it comes to the business world, health and safety protocol should
be at the top of any executive priority list. These processes are just as
important as sales and marketing to the successes and failures of any
company.

Regardless of industry, the possibility of accidents is always present. Some


fields of work present more potential than others but the bottom line is that
there need to be distinct protocols in place for workplace health and safety.
This can be accomplished by investing in certification courses for your current
WHS staff members.

Question 11: Answer the following questions:

A. What are the different factors to consider while securing approval of an ICT project? Write your
response in 50-100 words.

B. What are the factors to consider while designing a client report? Write your response in 100-150
words.

The different factors to thought whereas securing approval of AN ICT project are:

 A title, spoken language what it's that you simply wish the consumer or
govt to approve (a style set up, a form, a templet etc.). A relevancy the role
this document can play in AN over-all project or system.
 A description of what's being united to together with an outline of what has
been reviewed.
 A rationalization of however any later changes to the documentation could
also be handled once the shape has been signed.
 In cases wherever work has been done beneath contract, particularly for AN
agreed-to deliverable, permission to issue AN invoice may also be enclosed.
 Space for linguistic communication and chemical analysis.
B) The factors to be consider whereas designing consumer report are as

Agree before you write- Establish report temporal order and content at the
beginning of your consumer engagement. each engagement are completely
different. For long comes, your consumer might like a monthly telephony, weekly

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 33 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


email summaries, and a quarterly report. Some purchasers might want a brief
weekly report and a additional comprehensive monthly report. Establish up front
the frequency, method, and detail of communications.
Write a powerful Summary- Even with up front agreement, some purchasers,
notably senior level managers, might not have time to scan the complete report.
Use AN “executive summary” format that may simply stand alone to speak the
numerous components of the report, together with onerous facts and figures
Maximize Readability- Even with up front agreement, soe purchasers, notably
senior level managers, might not have time to scan the complete report. Use AN
“executive summary” format that may simply stand alone to speak the numerous
components of the report, together with har facts and figures
Keep it simple- The reports should be as long because it have to be compelled to
be. It should not be too lenthy. a transparent language should be use.
Customize with temperament- The report should align with the consumer culture
however mirror personality of own complete. Report writing doesn't got to be
empty of the temperament to be skilled

Writing for audience. The report should be written on the idea what the audience wish
or wish to scan. The question they need are answered or not should be taken under
consideration.

Question 12: Answer the following Questions:

A. What are the factors to consider while preparing the documentation for server
configuration and operational changes? Write your response in 100-150 words.

B. What are the benefits of cleanup and restoration of an ICT worksite as per client’s
satisfaction? Write your response in 150-200 words.

Answers: The server documentation tool XIA Configuration discovers your Windows
machines and documents their configuration. This helps organizations retain
information about environments, transfer knowledge, and save time otherwise
spent performing these tasks manually.

 Scan Active Directory to detect and inventory computers on your domain


 Continuously generate always up to date documentation
 Check that your servers follow best practices and security standards
 Audit Windows machines with the reporting feature

Detect changes to a server's configuration and compare items to expose


incorrectly configured Windows machines or security vulnerabilities.
Utilise features such as version control, PDF output, PowerShell support and more.

B) The factors to be consider whereas designing consumer report are as

Agree before you write- Establish report temporal order and content at the
beginning of your consumer engagement. each engagement is completely
different. For long comes, your consumer might like a monthly telephony, weekly
email summaries, and a quarterly report. Some purchasers might want a brief
weekly report and an additional comprehensive monthly report. Establish up front
the frequency, method, and detail of communications.
Write a powerful Summary- Even with up front agreement, some purchasers,
notably senior level managers, might not have time to scan the complete report.
Use AN “executive summary” format that may simply stand alone to speak the
numerous components of the report, together with onerous facts and figures

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 34 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Maximize Readability- Even with up front agreement, some purchasers, notably
senior level managers, might not have time to scan the complete report. Use AN
“executive summary” format that may simply stand alone to speak the numerous
components of the report, together with hard facts and figures
Keep it simple- The reports should be as long because it has to be compelled to be.
It should not be too lengthy. a transparent language should be use.
Customize with temperament- The report should align with the consumer culture
however mirror personality of own complete. Report writing doesn't get to be
empty of the temperament to be skilled

Writing for audience. The report should be written on the idea what the audience wish
or wish to scan. The question they need are answered or not should be taken under
consideration.

B) A server room can be considered one of the most important aspects of an IT


environment. Most of these rooms utilize large amounts of cables and without
adequate care, they could get entangled over time. In this case, traditional clean
up practices will not work well on sensitive electronics. Cable entanglement is not
only the problem you will face as excessive accumulation of dust is another issue
too.
Over time, innumerable amounts of dust can pile up within any exposed hardware
which may also affect the performance of certain systems. These common server
room situations should be avoided from the start and it is pertinent that you keep
the room clean, tidy and organized. Here are some of the best ways to go about it.
If the old feather duster is unable to tackle those hard-to-reach spots in the server
room, you should opt for compressed gas canisters as well as a modern electric
duster instead. The latter is able to tackle large scale environments like a server
room. It is recommended that you go for electric dusters that come with a 500-
watt motor to blast dust off crevices and fans in the most effective manner. You
will also quickly notice that your investments for such equipment will pay off for
itself.
If you plan to utilise some sort of AC vacuum device within the premises, you may
want to plug the device into an outlet that’s away from the server room. Although
this sounds like some kind of superstition, let’s play it safe by not disturbing
equilibrium of a server environment.

Reckless usage water is not recommended in a room full of sensitive and


expensive electronic equipment. You might want to engage the assistance of a
professional cleaning service that has adequate experience and skills to actualize
the clean-up plan. Speaking of which, you will want to be mindful of where you
install any electronic gear such as air conditioning units as they can drip water.

Question 13: Answer the following questions:

A. What are the steps included in validating changes for a system? Write 100-150 words.

B. Explain the importance of server testing? Write your answer in 30-50 words.

Controlling the changes is the process of managing how changes are introduced

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 35 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


into a controlled System. Change control illustrates that even after the changes
has been made system remains under control. Change Control systems are a
favorite target of regulatory auditors because they vividly demonstrate an
organization’s capacity to control its systems.
Some important steps included in validating changes for a system are:
1. Request the Change:
The System Owner formally requests a change to the system.
2. Assess the Impact of the Change:
Before the change is made, the system owner and other key stake holders,
including Quality, determine how the change will affect the system.
3. System Development in a Safe Environment:
Changes should be initially made away from the validated system. For computer
systems, this can mean testing in a Sandbox environment. For equipment, process
or method validations, this usually means implementing the change during a
period when manufacturing has shut down.
4. System Testing/Re-Validation:
Before changes are accepted, the system is validated to ensure system accuracy,
reliability and consistent intended performance.
5. Implementation of the Change:
The changed system is released to the site and users are trained on changes to
the system. For computer systems, this means pushing the changes out to general
users. For equipment, process or method validation, this means introducing the
system into the larger production process.
B) Server testing is important to see how new software will affect network because
if it damage the network with it being in the test network that won’t the real
network. It involves the overall testing of a complete server of many subsystem
components or elements. The system under test may be composed of hardware,
or software, or hardware with embedded software, or hardware/software with
human-in-the-loop testing. Server Testing consists, initially, of the "process of
assembling the constituent parts of a system in a logical, cost-effective way,
comprehensively checking system execution (all nominal & exceptional paths),
and including a full functional check-out. “Following integration, system test is a
process of "verifying that the system meets its requirements, and validating that
the system performs in accordance with the customer or user expectations.

Question 14: How to test the network server return error code 1603 and how to solve this error?
Add snapshots.

Test the server with the return error code 1603

* Syntax
Parameter Set: CommonTCPPort
Test-NetConnection [[-ComputerName] <String> ] [-CommonTCPPort] <String> [-
InformationLevel <String> ] [ <CommonParameters>]

Parameter Set: ICMP


Test-NetConnection [[-ComputerName] <String> ] [-Hops <Int32> ] [-
InformationLevel <String> ] [-TraceRoute] [ <CommonParameters>]

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 36 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Parameter Set: RemotePort
Test-NetConnection [[-ComputerName] <String> ] -Port <Int32> [-
InformationLevel <String> ] [ <CommonParameters>]
Solve error process are:

Step 1: Generate a verbose log file named msi*.log in the %temp% directory
the next time the setup package is executed. (Click here to know more ways to
generate log). Know more about the command-line switches here.

msiexec /i <msipath>setup.msi /l*v c:\temp\msi.log


Step 2: Open the verbose log in a text editor such as notepad and search for
the string “return value 3”. In nearly all cases, this will take us to the section in
the verbose log that lists the action that failed that initially caused setup to
rollback.

Step 3: Review the contents of the log file immediately above the “return value 3”
string to determine which custom action or standard action failed. Depending on
which action is failing, We will need to proceed to more detailed debugging from
here.

Question 15: Explain the process of error reporting in Microsoft Windows Server? Write your
answer in 100-150 words.
In addition to data flexibility and persistency, a platform-as-a-service (PaaS)
offering managed by Azure was more appealing than the alternatives for the
Microsoft Error Reporting team. Microsoft Error Reporting already made
extensive use of other Azure services, such as Azure SQL Database, Azure Blob
storage, and Azure Queue storage, so consolidating on Azure with the move to
Document DB helped the Microsoft Error Reporting team simplify its
management. It also allowed the team to move away from on-premises
hardware.

In the past, the Microsoft Error Reporting team had to invest heavily in costly,
space-consuming, and energy-consuming on-premises servers. Embracing
Document DB has enabled the Microsoft Error Reporting team to greatly simplify
its architecture, paring down one key component from 30 servers in the recent
past to a single web endpoint today. This simplified architecture directly translates
into efficiency for the Microsoft Error Reporting team. Previously, the team relied
on SQL Server gurus to carefully curate Microsoft Error Reporting data and on
database administrators to continuously maintain the databases on the internal
servers. Handing all of its database management over to Azure has freed up the
team’s resources to focus on development. It has also made it easier for the team
to try new things: rather than IT management being a bottleneck for experiments,
the Azure PaaS offering enables the Microsoft Error Reporting team to experiment
with more agility, such as by incorporating new types of data into its analyses.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 37 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Question 16: What are the seven (7) factors to consider while analysing and documenting the data
migration requirements? Write your answer in 100-150 words.

Factors to consider during a data migration project include how long the migration will take;
the amount of downtime required; and the risk to the business due to
technical compatibility issues, data corruption, application performance issues, and missed
data or data loss.

 Host-based software is best for application-specific migrations, such as platform


upgrades, database replication and file copying.
 Array-based software is primarily used to migrate data between like systems.
 Network appliances migrate volumes, files or blocks of data depending on their
configuration.
 Understand what data you are migrating, where it lives, what form it's in
and the form it will take at its new destination.
 Extract, transform and deduplicate data before moving it.
 Implement data migration policies so data is moved in an orderly manner.
 Test and validate the migrated data to ensure it is accurate.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 38 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Question 17: Explain the following terms in 30-100 words for each:
A. Business problems
B. Opportunities
C. Scope
D. Budget

A. Business problems

 Uncertainty concerning the long run


Being able to predict client trends, market trends, etc. is important to a
dynamic economic climate, however not each chief operating officer has
Warren Buffett-like prognosticative powers. transportation during a advisor
trained in reading and predicting those all-important trends may well be the
distinction between a bright future and a murky one.

 Financial management
Many CEOs i do know are concepts people; meaning they’re nice at the
massive image and unquiet thinking, however less sensible with things like
income, profit margins, reducing prices, financing, etc. little and medium
businesses might not need a full-time corporate executive, however would
do higher to use a money advisor United Nations agency will step into the
role as required.

 Monitoring performance
Using an important set of rounded performance indicators that offer the
business with insights concerning however well it's playing is essential.
Most business individual’s i do know aren't consultants in the way to
develop KPIs, the way to avoid the key pitfalls and the way to best
communicate metrics so they inform decision-making. In most cases
corporations admit too straightforward finance indicators that simply
occlude the company reportage channels.

 Regulation and compliance


As markets and technologies shift, so do rules and rules. reckoning on your
trade, it will create rather more sense to herald a advisor to assist with
these areas instead of making an attempt to know the complexities yourself
— and risk fines or worse for non-compliance.

B. Opportunities


It is an appropriate or favourable time or occasion: Their meeting afforded
an opportunity to exchange views. a situation or condition favourable for
attainment of a goal. a good position, chance, or prospect, as for
advancement or success. It is simply a chance to have something that we
have been trying to during the life. People get opportunity to do business or

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 39 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


to know new things. And they are successful in using hat opportunity in the
right way, they will obviously be a successful person in their life.
Opportunity might be in the field of education, sports, music, others.

 C.Scope
Its means an application of something in the market. Suppose we are about
to start a business, then we have to know the scope of that business in the
present situation or future. People consider something to do after knowing
the scope of that particular activity in their life. At present situation every
people concerns about scope of any things they do in their life. Another
meaning of the scope is it is an instrument or device that is used by military
person in the gun, sniper etc.

 D.Budget
A budget is normally called capital over a specified future period of time. It
is also a revenue or expenses for certain business. It is compiled and re-
evaluated on a periodic basis. Budgets can be made for a person, a family,
a group of people, a business, a government, a country, a multinational
organization or just about anything else that makes and spends money. At
companies and organizations, a budget is an internal tool used by
management and is often not required for reporting by external parties. In
general, traditional budgeting starts with tracking expenses, eliminating
debt and, once the budget is balanced, building an emergency fund. But to
speed up the process, you could start by building a partial emergency fund.
This emergency fund acts as a buffer as the rest of the budget is put in
place, and should replace the use of credit cards for emergency situations.
The key is to build the fund at regular intervals, consistently devoting a
certain percentage of each paycheck toward it and, if possible, putting in
whatever you can spare on top. This will get you to think about your
spending, too.

Question 18: Answer the following questions:


A. What is meant by prototype design? Write your answer in 50-100 words.
B. What are the factors to consider for the network server installation checklist for the quality
assurance? Write your response in 100-150 words.

 In software system development, a model may be a rudimentary operating


model of a product or data system, sometimes designed for demonstration
functions or as a part of the event method. within the systems development
life cycle (SDLC) Prototyping Model, a basic version of the system is made,
tested, then reworked as necessary till an appropriate model is finally
achieved from that the whole system or product will currently be developed.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 40 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 In prototype-based programming, a model is an explicit object; new objects
area unit created by repetition the model.

In hardware style, a model may be a "hand-built" model that represents a


factory-made (easily replicable) product sufficiently for designers to envision
and check the look

 B) The factors to consider fo the network server installation checklist for the
quality assurance are as follows:

1. Hardware Test (if applicable)

2. Install the OS

3. Configure the OS. Pay special attention to:

 Network configuration

 Domain or other remote login service

 Local user accounts

 Necessary software for the server's role

 OS Patches
4. Rack & Stack. Make sure to verify:
 Adequate power/cooling

 Network connectivity

 Adding the machine to any asset management system(s)

 Adding the machine to any patch deployment system(s)

 Adding the machine to any monitoring system(s)

Question 19: Answer the following questions:


A. What is meant by patching the operating system and applications to enable maximum security
and reliability? Write your answer in 50-100 words.

B. Explain the different options involved in the configuration of automatic updates for Windows
Server 2016. Write your answer in 200-150 words.

 Six steps for security patch management best practices

 Patch management is a complex process, and I can't cover all the variables

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 41 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


here. But I can distill the process into six general steps. The importance of each
stage of the patch process--and the amount of time and resources you should
spend on it--will depend on your organization's infrastructure, requirements and
overall security posture.

 Step 1: Develop an up-to-date inventory of all production systems, including


OS types (and versions), IP addresses, physical location, custodian and function.
Commercial tools ranging from general network scanners to automated discovery
products can expedite the process (see Resources, below). You should inventory
your network periodically.

 Step 2: Devise a plan for standardizing production systems to the same


version of OS and application software. The smaller the number of versions you
have running, the easier your job will be later.

 Step 3: Make a list of all the security controls you have in place--routers,
firewalls, IDSes, AV, etc.--as well as their configurations. Don't forget to include
system hardening or nonstandard configurations in your list of controls. This list
will help you decide how to respond to a vulnerability alert (if at all). For example,
let's say you learn that OpenSSH has a vulnerability that may allow a buffer-
overflow attack, but from your list of controls you know you don't allow the SecSH
protocol through your firewall. If nothing else, that knowledge gives you more time
to react.

 Step 4: Compare reported vulnerabilities against your inventory/control list.


There are two key components to this. First, you need a reliable system for
collecting vulnerability alerts. And second, you need to separate the vulnerabilities
that affect your systems from those that don't. Some companies have staff

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 42 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


dedicated to managing this process; others use vulnerability reporting services.

 Step 5: Classify the risk. Assess the vulnerability and likelihood of an attack
in your environment. Perhaps some of your servers are vulnerable, but none of
them is mission-critical. Perhaps your firewall already blocks the service exploited
by the vulnerability. In general, to classify and prioritize the risk, consider three
factors: the severity of the threat (the likelihood of it impacting your environment,
given its global distribution and your inventory/control list); the level of
vulnerability (e.g., is the affected system inside or outside perimeter firewalls?);
and the cost of mitigation and/or recovery.

 Step 6: Apply the patch! OK, so now you have an updated inventory of
systems, a list of controls, a system for collecting and analysing vulnerability alerts
and a risk classification system. You've determined which patches you need to
install. Now comes the hard part: deploying them without disrupting uptime or
production. Fear not, there are several tools that can help you with the actual
patch process (see Resources, below). Evaluate these tools in terms of how well
they fit your environment and budget. In some cases, manual patch maintenance
may be more cost-effective. But in most cases--particularly for multiple servers or
server farms distributed across multiple locations--some type of automated patch
system will more than pay for itself.

B) Automatic updates are only for critical updates. They do not include security patches,
service patches, drivers, or other updates. It is recommended you set up your computer
to do critical updates automatically, even though they are also included in the standard
Windows Updates. You must perform all updates to secure your system. To set up
automatic critical updates:

 Click Start > Control Panel > Security if using Windows Vista or higher
 Assure that the option for automatic updates is turned on.

Windows Security, Service Patch, Drivers, and Other Updates

In addition to setting your computer to do critical updates automatically, you must also
check for and install security and service patch updates. It is recommended that you do
this procedure at least weekly.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 43 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 Using the Internet Explorer browser, click Tools > Windows Update
 In Windows Vista or Windows 7, click Safety > Windows Update
 Select the Express option. A check will be performed and you will be presented
with a listing of updates.
 Always select and install security and service patch updates. Driver or other
updates should be installed if they apply to your particular system and needs.

MACINTOSH UPDATES

You must be connected to the Internet to perform updates.

1. Open Software Update by clicking the System Preferences icon in the dock.
2. Select Software Update.
3. Click Update Now.
4. You will now connect to Apple's website and retrieve the latest updates. You will
see a list of updates. Check the items you wish to install and click Install.
5. If asked to accept a software license agreement, read the agreement and
click Accept.
6. Sometimes new components will ask you to restart your computer. If so, you will
see a Restart button. Save your work and close any open programs before
clicking Restart.
7. If the Software Update did not find any new components, you will be so informed
and you may exit

Question 20: Answer the following questions.


A. Explain network services in your own words. In 50-100 words.
B. List any five network services and network connectivity devices.

In computer networking, a network service is an application running at the


network application layer and above, that provides data storage, manipulation,
presentation, communication or other capability which is often implemented
using a client-server or peer-to-peer architecture based on application
layer network protocols.
Each service is usually provided by a server component running on one or

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 44 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


more computers (often a dedicated server computer offering multiple services)
and accessed via a network by client components running on other devices.
However, the client and server components can both be run on the same
machine.

B
The list of the five netwok services are

 Directory services
 e-Mail
 File sharing
 Instant messaging
 Online game

Network conictivity are


 The Network Interface card (NIC)

 The hub.

 The switch.

 The bridge.

 Transceivers.

Unit Assessment Result Sheet (UARS)


Assessment Task 1 – Unit Knowledge Test (UKT)
Student and Trainer/Assessor Details
Unit code ICTNWK505
Unit name Design, build and test a network server
Outcome of Unit First attempt:
Assessment Task (UAT)
Outcome (please make sure to tick the correct checkbox):
Satisfactory (S) ☐ or Not Satisfactory (NS) ☐

Date: _______(day)/ _______(month)/ ____________(year)


Second attempt:

Outcome (please make sure to tick the correct checkbox):


Satisfactory (S) ☐ or Not Satisfactory (NS) ☐
Date: _______(day)/ _______(month)/ ____________(year)
Feedback to Student First attempt:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 45 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

 Second attempt:

Student Declaration  I declare that the answers I have provided are my own work.
Where I have accessed information from other sources, I have
provided references and or links to my sources.
 I have kept a copy of all relevant notes and reference material
that I used as part of my submission.
 I have provided references for all sources where the
information is not my own. I understand the consequences of
falsifying documentation and plagiarism. I understand how
the assessment is structured. I accept that all work I submit
must be verifiable as my own.
 I understand that if I disagree with the assessment outcome, I
can appeal the assessment process, and either re-submit
additional evidence undertake gap training and or have my
submission re-assessed.
 All appeal options have been explained to me.
Student Signature
Date
Trainer/Assessor Name Gitam lama
Trainer/Assessor I hold:
Declaration  Vocational competencies at least to the level being delivered
 Current relevant industry skills
 Current knowledge and skills in VET, and undertake
 Ongoing professional development in VET
I declare that I have conducted an assessment of this candidate’s
submission. The assessment tasks were deemed current, sufficient,
valid and reliable. I declare that I have conducted a fair, valid, reliable,
and flexible assessment. I have provided feedback to the above-
named candidate.
Trainer/Assessor
Signature
Date
Office Use Only Outcome of Assessment has been entered onto the Student
Management System on _________________ (insert date)
by (insert Name) __________________________________

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 46 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Unit Pre-Assessment Checklist (UPAC)
UAT 2 – Unit Project (UP)
Purpose of the checklist
The pre-assessment checklist helps students determine if they are ready for assessment. The
trainer/assessor must review the checklist with the student before the student attempts the
assessment task. If any items of the checklist are incomplete or not clear to the student, the
trainer/assessor must provide relevant information to the student to ensure they understand the
requirements of the assessment task. The student must ensure they are ready for the assessment
task before undertaking it.
Section 1: Information for Students
 Please make sure you have completed the necessary prior learning before attempting this
assessment.
 Please make sure your trainer/assessor clearly explained the assessment process and tasks
to be completed.
 Please make sure you understand what evidence is required to be collected and how.
 Please make sure you know your rights and the Complaints and Appeal process.
 Please make sure you discuss any special needs or reasonable adjustments to be considered
during the assessment (refer to the Reasonable Adjustments Strategy Matrix and negotiate
these with your trainer/assessor).
 Please make sure that you have access to a computer and the internet (if you prefer to type
the answers).
 Please ensure that you have all the required resources needed to complete this Unit
Assessment Task (UAT).
 Due date of this assessment task is according to your timetable.
 In exceptional (compelling and compassionate) circumstances, an extension to submit an
assessment can be granted by the trainer/assessor.
 Evidence of the compelling and compassionate circumstances must be provided together
with your request for an extension to submit your assessment work.
 Request for an extension to submit your assessment work must be made before the due date
of this assessment task.

Section 2: Reasonable adjustments


 Students with carer responsibilities, cultural or religious obligations, English as an additional
language, disability etc. can request for reasonable adjustments.
 Please note, academic standards of the unit/course will not be lowered to accommodate the
needs of any student, but there is a requirement to be flexible about the way in which it is
delivered or assessed.
 The Disability Standards for Education requires institutions to take reasonable steps to
enable the student with a disability to participate in education on the same basis as a
student without a disability.
 Trainer/Assessor must complete the section below “Reasonable Adjustment Strategies
Matrix” to ensure the explanation and correct strategy have been recorded and
implemented.
 Trainer/Assessor must notify the administration/compliance and quality assurance
department for any reasonable adjustments made.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 47 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 All evidence and supplementary documentation must be submitted with the assessment
pack to the administration/compliance and quality assurance department.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 48 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Reasonable Adjustment Strategies Matrix (Trainer/Assessor to complete)
Category Possible Issue Reasonable Adjustment Strategy
(select as applicable)
 LLN  Speaking  Verbal assessment
 Reading  Presentations
 Writing  Demonstration of a skill
 Confidence  Use of diagrams
 Use of supporting documents such as wordlists
 Non-  Speaking  Discuss with the student and supervisor (if applicable)
English  Reading whether language, literacy and numeracy are likely to
Speaking  Writing impact on the assessment process
Background
 Cultural  Use methods that do not require a higher level of
background language or literacy than is required to perform the job role
 Confidence  Use short sentences that do not contain large amounts
of information
 Clarify information by rephrasing, confirm understanding
 Read any printed information to the student
 Use graphics, pictures and colour coding instead of, or to
support, text
 Offer to write down, or have someone else write, oral
responses given by the student
 Ensure that the time available to complete the
assessment, while meeting enterprise requirements, takes
account of the student’s needs
  Knowledge and  Culturally appropriate training
Indigenous understanding  Explore understanding of concepts and practical
 Flexibility application through oral assessment
 Services  Flexible delivery
 Inappropriate  Using group rather than individual assessments
training and  Assessment through completion of practical tasks in the
assessment field after demonstration of skills and knowledge.
 Age  Educational  Make sure font size is not too small
background  Trainer/Assessor should refer to the student’s experience
 Limited study  Ensure that the time available to complete the
skills assessment takes account of the student’s needs
 Provision of information or course materials in accessible
format.
 Changes in teaching practices, e.g. wearing an FM
microphone to enable a student to hear lectures
 Supply of specialised equipment or services, e.g. a note-
taker for a student who cannot write
 Changes in lecture schedules and arrangements, e.g.
relocating classes to an accessible venue
 Changes to course design, e.g. substituting an
assessment task
 Modifications to physical environment, e.g. installing

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 49 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Reasonable Adjustment Strategies Matrix (Trainer/Assessor to complete)
Category Possible Issue Reasonable Adjustment Strategy
(select as applicable)
lever taps, building ramps, installing a lift
  Reading  Discuss with the Student previous learning experience
Educational  Writing  Ensure learning and assessment methods meet the
background
 Numeracy student’s individual need
 Limited study
skills and/or
learning strategies
 Disability  Speaking  Identify the issues
 Reading  Create a climate of support
 Writing  Ensure access to support that the student has agreed to
 Numeracy  Appropriately structure the assessment
 Limited study  provision of information or course materials in accessible
skills and/or format, e.g. a text book in braille
learning strategies  Changes in teaching practices, e.g. wearing an FM
microphone to enable a student to hear lectures
 Supply of specialised equipment or services, e.g. a note
taker for a student who cannot write
 Changes in lecture schedules and arrangements, e.g.
relocating classes to an accessible venue
 Changes to course design, e.g. substituting an
assessment task
 Modifications to physical environment, e.g. installing
lever taps, building ramps, installing a lift

Explanation of reasonable adjustments strategy used (If required)

Unit Assessment Task (UAT)


Assessment Task 2 – Unit Project (UP)
Assessment type:
Unit Project (UP)

Assessment task description:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 50 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 This is the second (2) assessment task you have to successfully complete to be deemed
competent in this unit of competency.
 This assessment task requires you to complete a project.
 You will receive your feedback within two weeks - you will be notified by your
trainer/assessor when results are available.
 You must attempt all activities of the project for your trainer/assessor to assess your
competency in this assessment task.

Applicable conditions:
 This project is untimed and are conducted as open book tests (this means you are able to
refer to your textbook).
 You must read and respond to all criteria of the project.
 You may handwrite/use computers to answer the criteria of the project.
 You must complete the task independently.
 No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
 As you complete this assessment task you are predominately demonstrating your practical
skills, techniques and knowledge to your trainer/assessor.
 The trainer/assessor may ask you relevant questions on this assessment task to ensure that
this is your own work.

Resubmissions and reattempts:


 Where a student’s answers are deemed not satisfactory after the first attempt, a
resubmission attempt will be allowed.
 You must speak to your Trainer/Assessor if you have any difficulty in completing this task and
require reasonable adjustments (e.g. can be given as an oral assessment).
 For more information, please refer to your RTO Student Handbook.

Location:
 This assessment task may be completed in an independent learning environment or learning
management system.
 Your trainer/assessor will provide you further information regarding the location of
completing this assessment task.

General Instructions for attempting the project:


 You will be analyse enterprise data security requirements create new plan, review encryption
technologies and their respective costs in this assessment task.
 Instructions analyse the existing security plan, create new plan, encrypt the data, and check
the system log to check for data compromises are provided within the assessment task.
 You will be required to correctly attempt all activities of this assessment task.

How your trainer/assessor will assess your work?


 This assessment task requires the student to successfully complete and submit a project.
 Answers must demonstrate the student’s understanding and skills of the unit.
 You will be assessed according to the provided performance checklist/ performance criteria.
 Assessment objectives/ measurable learning outcome(s) are attached as performance
checklist/ performance criteria with this assessment task to ensure that you have
successfully completed and submitted the assessment task.
 If all assessment tasks are deemed Satisfactory (S), then the unit outcome is Competent (C).
 If at least one of the assessment task is deemed Not Satisfactory (NS), then the unit outcome
is Not Yet Competent (NYC).

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 51 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 Once all assessment tasks allocated to this Unit of Competency have been undertaken,
trainer/assessor will complete an Assessment plan to record the unit outcome. The outcome
will be either Competent (C) or Not Yet Competent (NYC).
 The “Assessment Plan” is available with the Unit Assessment Pack (UAP) – Cover Sheet.

Purpose of the assessment task:

This assessment task is designed to evaluate your following skills and abilities to implement
integrated server solution.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 52 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Assessment Task 2 - Unit Project (UP)
Instructions to complete this assessment task:
 Please write your responses in the template provided.
 You may attach a separate sheet if required.
 You must include the following particulars in the footer section of each page of the attached
sheets:
o Student ID or Student Name
o Unit ID or Unit Code
o Course ID or Course Code
o Trainer and assessor name
o Page numbers
 You must staple the loose sheets together along with the cover page.
 You must attach the loose sheets chronologically as per the page numbers.
 Correction fluid and tape are not permitted. Please do any corrections by striking through
the incorrect words with one or two lines and rewriting the correct words.
 The premise of the project must be closely related to the previous assessment task.
 This submission must be well presented and follow the guidelines and instructions provided.
 Please follow the format as indicated in the template section below.
 One of the most important steps that you can take: proofread your project.
 Project must be of 500-800 words in length, using 11-point font, double-spaced, and must
include a cover page, table of contents, introduction, body, summary or conclusion, and
works cited.
 Appropriate citations are required.
 All RTO policies are in effect, including the plagiarism policy.

Resources required to complete the assessment task:


 Computer
 Internet
 MS Word

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 53 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Scenario: -

Delta International College is a globally-recognised education institution, specialising in providing


international students with vocational education training in a supportive and caring environment.
Due to the progressive success of the institute, it has been decided by the IT department and the
Academics department to have the centralised system for the management of the students’ records,
both the academic progress and the personal information.

For this purpose an online academics management system has already been approved and is set to
be implemented across the institute. The system is known as the MOODLE and will make the
students to do their assessments online on the premises of the institute. This system will also help
the trainers to check and assess these assessments online. Also, an in house developed Student
Information Management System is to be implemented to record the personal information and
documents of the students along with their accounts/fees management.

For, this IT department lead by Neil, IT Manager will supervise the implementation of the network
server so that these systems can be implemented and can be used on the network of the institute.
While Rob, the System Administrator will be responsible for setup of a network server for the
implementation of the MOODLE and Student Information Management System on it.

The network server will be online and can be accessed from anywhere in the college using the
network connected computers. Also, the network is comprised of computers, scanners, printers and
a WiFI access point enabling the laptops and hand held devices to be connected with the network
and can access the network server. Note, the network server can only be access within the LAN of
the institute that means it cannot be access remotely or using the internet.

The job descriptions of IT Manager and System Administrator are as below:

Job Description of IT manager:

 Analyse business needs presented by users and recommend technical solutions with
completion timeline
 Maintain organisation’s effectiveness and efficiency by defining, delivering, and supporting
strategic plans
 Direct research in emerging technology by studying organisation goals, strategies, practices,
and user projects
 Produce detailed timelines and implement effective project control for each software release
 Verify application results by conducting system audits of technologies implemented
 Preserve assets by implementing disaster recovery, backup procedures, information security
and control structures
 Recommend information technology strategies, policies, and procedures by evaluating
organisation outcomes, identifying problems, and anticipating organisational requirements
 Accomplish financial objectives by forecasting requirements, preparing an annual budget,
scheduling expenditures, analyzing variances, and initiating corrective action
 Install hardware and peripheral components
 Load appropriate software packages such as operating systems
 Administer email and anti-virus systems
 Troubleshoot and resolve user issues relative to all corporate software in a timely manner
 Participate in all hardware and software evaluations and maintains vendor contracts
Job Description of System Administrator:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 54 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 Providing 1st and 2nd level support to ICT setup.
 Solving our student's and staff’s IT issues in a manner that exceeds their expectations.
 New Ticket Triage.
 Creating and documenting tickets, problem descriptions and technical background to ensure
that our team members have all the information required to determine the right solution for
the issue.
 Completing assigned backup checks.
 Updating ticket status as they change.
 Updating client and internal documents to reflect changing environments and knowledge.
 Providing 1st and 2nd level support to our clients based on ticket priority.
 Solving our client's IT issues in a manner that exceeds their expectations.
 Taking accountability and ownership for our client's IT issues as allocated on the Response
Team Board,
 New Ticket Triage.
 Creating and documenting tickets, problem descriptions and technical background to ensure
that our team members have all the information required to determine the right solution for
the issue.
 Completing assigned backup checks.
 Updating ticket status as they change.
 Updating client and internal documents to reflect changing environments and knowledge.

The Network Diagram for the Delta College is given as below:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 55 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 56 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Activity 1:

Task 1: (Role Play on preparation of designing of network server as per the business requirements)

The IT department has decided to arrange a meeting and discuss with the other stakeholders about
the planning, designing and implementation of the network server. The IT department also needs to
consult with the stakeholders about the benefits of the implementation of the network server and
then acquire the approval from the competent authority.

In this role play the stakeholders include the General Manager, Finance Manager, IT Manager, System
Administrator and the Operations Manager which will act as the client. The IT administrator will
elaborate and discuss the planning and designing of the network server. While the finance Manager
will be responsible for consideration of the budget issues. The Assessor will act as the IT Manager
and will supervise all the discussion of the System Administrator with the stakeholders. While three
students will act the Finance Manager, General Manager and the Operations Manager.

In the role play, the Student will act as the System Administrator and will need to discuss the
following and also he is responsible for the recording of the minutes of meetings and get these
signed from the authorised personals, the template of the minutes of meetings is given below:

 Discuss with the stakeholders about the requirements of the network server. You need to
elaborate the requirements for the network server for the organisation.

 Discuss with the Finance Manager, about the business problems, opportunities, scope and
budget of the implementation. The Finance Manager will arise the financial constraints but
you need to explain the benefits of paperless environment as per the scenario.

 Discuss and identify the hazards and risks associated and discuss these with the IT Manager
and Operations Manager.

 Discuss the site clean-up and restoration for the server room.

 Get the minutes of meetings signed from the General Manager.

You are required to complete the following meeting minute’s template and submit to your
trainer/assessor.

Minutes of Meeting: 1 hour

Meeting Objective: To prepare and design network server as per the business requirements

Attendees: 4

IT manager, General Manager, Finance Manager and Operation Manager

Venue: SABT Lab

Date: 2018/09/17

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 57 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

No Points Discussed Actions Suggested Target Date


1 requirements of the network Consult with 1 week
server for the organisation stakeholders to update
the server and its
requirement

2 Budget for the implementation Consult with finance 1 month


manager to improve
server and improve
working environment
3 Discuss about the hazard and risk Consult with IT 2 weeks
in the server. manager to identify
risks, hazards and the
ways to tackle.

4 Discuss about clean up and Set backup and 1 week


restoration of server restoration program

Signature of attendee 1: IT MG Signature of attendee 2: General MG

Signature of attendee 3: Finance MG Signature of attendee 4: Operation MG

Task 2: Report - (Documentation of the plan and design of the Network Server)

Once the discussion and the approval of the project has been acquired, you need to prepare a report
on the design and the planning of the implementation of the Network Server. Also, once the report is
completed you need it be signed from the IT Manager for the approval of the designing phase and
initiation of the implementation. The report will include the following points and also complete the
template given below:

 Requirements for the data migration for the new server

 Specifications of the network server (Windows Server 2016)

 Details of design, configuration of network services, server applications security and


redundancy

 Details of the prototype design

 Checklist for the installation of the server for the quality assurance process

 Test plan as per the requirement of the organisation along with the performance standards
and quality expectations

 Details of Work Health and Safety processes and procedures


Australian Training School trading as Southern Academy of Business and Technology
Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 58 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 Details of backup of the system for the installation procedures

Report on Design and Planning of the Network Server

Purpose: To design network server

Department: IT department

Stakeholders: IT manager Neil

Supervised by: IT manager Neil

 Requirements for the data migration

Requirement migration matrix for Windows Server 2016

Windows Server 2016


The grid on this page explains your server role upgrade and migration options specifically for moving
to Windows Server 2016. For individual role migration guides, visit. For more information about
installation and upgrades, see Windows Server Installation, Upgrade, and Migration.

Upgradeable
from
Upgradeable Windows
from Windows Server
Server Role Server 2012 R2? 2012? Migration Supported?

Active Yes Yes Yes


Directory
Certificate
Services

Active Yes Yes Yes


Directory
Domain
Services

Active No No Yes
Directory
Federation
Services

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 59 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Upgradeable
from
Upgradeable Windows
from Windows Server
Server Role Server 2012 R2? 2012? Migration Supported?

Active Yes Yes Yes


Directory
Lightweight
Directory
Services

Active Yes Yes Yes


Directory
Rights
Management
Services

DHCP Server Yes Yes Yes

DNS Server Yes Yes Yes

Failover Yes with Cluster Not while Yes


Cluster OS Rolling the server is
Upgrade process part of a
which includes cluster. Yes,
node Pause- when the
Drain, Evict, server is
upgrade to removed by
Windows Server the cluster
2016 and rejoin for upgrade
the original and then
cluster. Yes, added to a
when the server different
is removed by cluster.
the cluster for
upgrade and
then added to a

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 60 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Upgradeable
from
Upgradeable Windows
from Windows Server
Server Role Server 2012 R2? 2012? Migration Supported?

different cluster.

File and Yes Yes Varies by sub-feature


Storage
Services

Hyper-V Yes. (When the No Yes


host is part of a
cluster with
Cluster OS
Rolling Upgrade
process which
includes node
Pause-Drain,
Evict, upgrade to
Windows Server
2016 and rejoin
the original
cluster.)

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 61 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Upgradeable
from
Upgradeable Windows
from Windows Server
Server Role Server 2012 R2? 2012? Migration Supported?

Print and Fax No No Yes (Printbrm.exe)


Services

Remote Yes, for all sub- Yes, for all Yes


Desktop roles, but mixed sub-roles,
Services mode farm is but mixed
not supported mode farm is
not
supported

Web Server Yes Yes Yes


(IIS)

Windows Yes N/A – new Yes


Server feature
Essentials
Experience

Windows Yes Yes Yes


Server
Update
Services

Work Folders Yes Yes Yes

 Specifications of the network server (Windows Server 2016) and Installation Checklist

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 62 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


System requirements:

Processor: 1.4Ghz 64-bit processor

RAM: 512 MB

Disk Space: 32 GB

Network: Gigabit (10/100/1000baseT) Ethernet adapter

Optical Storage: DVD drive (if installing the OS from DVD media)

Video: Super VGA (1024 x 768) or higher-resolution (optional)

Input Devices: Keyboard and mouse (optional)

Internet: Broadband access (optional)

 Details of design, configuration of network services, server applications security and


redundancy

Turn into a Windows Server 2012 R2 foundation in a venture domain. Gain learning and abilities to
outline a venture arrangement that backings manual and mechanized server establishments in a
physical and virtual condition. Get the total information on supporting document and capacity
administrations. Obtain aptitudes important to give endeavor organizing arrangements, for
example, DHCP, IPAM, VPN, and DirectAccess. Have the capacity to outline and execute a
backwoods and space framework including multi areas/timberland and branch office situations.

On request online self-managed Instructor-drove classes by Industry Experts

Plan, outline and convey a physical and coherent Windows Server® 2012 R2 endeavor framework

Simply Enough Administration.

*For application security and repetition

Simply Enough Administration in Windows Server 2016 is security innovation that empowers
designated organization for anything that can be made do with Windows PowerShell. Abilities
incorporate help for running under a system personality, interfacing over PowerShell Direct, safely
duplicating records to or from JEA endpoints, and designing the PowerShell support to dispatch in
a JEA setting as a matter of course. For more subtle elements, see JEA on GitHub.

Accreditation Guard

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 63 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Accreditation Guard utilizes virtualization-based security to disengage mysteries with the goal that
just advantaged framework programming can get to them. See Protect inferred area qualifications
with Credential Guard.

Remote Credential Guard

Certification Guard incorporates bolster for RDP sessions with the goal that the client
accreditations stay on the customer side and are not uncovered on the server side. This
additionally gives Single Sign On to Remote Desktop. See Protect inferred space qualifications with
Windows Defender Credential Guard.

Gadget Guard (Code Integrity)

Gadget Guard gives piece mode code uprightness (KMCI) and client mode code respectability
(UMCI) by making strategies that indicate what code can keep running on the server. See
Introduction to Windows Defender Device Guard: virtualization-based security and code honesty
strategies.

Windows Defender

Windows Defender Overview for Windows Server 2016. Windows Server Antimalware is
introduced and empowered of course in Windows Server 2016, however the UI for Windows
Server Antimalware isn't introduced. Notwithstanding, Windows Server Antimalware will refresh
antimalware definitions and ensure the PC without the UI. On the off chance that you require the
UI for Windows Server Antimalware, you can introduce it after the working framework
establishment by utilizing the Add Roles and Features Wizard.

Prototype design

Prototype design is a stage security highlight that was made to battle memory debasement
vulnerabilities. See Control Flow Guard for more data.

Model plan: A model is a unique model, frame or an occurrence that fills in as a reason for
different procedures. In programming innovation, the term model is a working precedent through
which another model or another adaptation of a current item can be determined.

https://docs.microsoft.com/en-us/windows-server/get-started/whats-new-in-windows-server-
2016

Create a test plan

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 64 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


1. If you haven't already, sign up for VSTS, create your project, and create your backlog.

2. In VSTS, open your project.

3. Go to the Test Plans tab of the Test hub. Create a test plan for your current sprint.

4. Name the test plan. Check the area path and iteration. Then choose Create.

Add a test suite and select backlog items to test

1. Now add test suites for the backlog items that need manual tests. (These backlog items
could be user stories, requirements, or other work items based on the setup of your
project.)

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 65 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

You use requirement-based suites to group your test cases together. That way, you can track the
testing status of a backlog item. Each test case that you add to a requirement-based test suite is
automatically linked to the backlog item.

2. Add a clause to filter by the iteration path for the sprint. Run the query to view the
matching backlog items.

3. Select the backlog items that you want to test this sprint. Add them as requirements to
your test plan by creating test suites from them.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 66 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Now you've created a requirement-based test suite for each backlog item.

 Work Health and Safety processes and procedures

A procedure sets out the steps to be followed for work activities. You must consult with affected
workers when developing procedures for:

 resolving work health and safety issues

 consulting with workers on work health and safety

 monitoring workers’ health and workplace conditions

 providing information and training.

Procedures should be in writing to provide clarity and certainty at the workplace and demonstrate
compliance. They should clearly set out the role of health and safety representatives, and any
other parties involved in the activity. The procedures should be easily accessible, for example by
placing them on noticeboards and intranet sites.

In the context of issue resolution where procedures are agreed to, the Work, Health and Safety
Regulations 2011 include minimum requirements including that these procedures are set out in
writing and communicated to all workers to whom the procedure applies.

Many workplaces are required by law to have health and safety committees, which help develop
standards, rules and procedures for health and safety that are to be followed or complied with at
the workplace. According to the Work Health and Safety Regulations 2011, when it comes to risk
management, a procedure is a form of ‘administrative control’ that means a method of work, a
process or a procedure designed to minimise risk.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 67 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

The Work Health and Safety Act (2011) states that while at work, a worker must co-operate with
any reasonable policy or procedure of the person conducting the business or undertaking (PCBU)
relating to health or safety at the workplace that has been notified to workers.

 Backup of the system for the installation procedures

To create and implement a backup and recovery plan. You’ll need to figure out what data needs to
be backed up, how often the data should be backed up, and more. To help you create a plan,
consider the following questions:

How important or sensitive is the data on your systems?

The importance of data can go a long way toward helping you determine if you need to back it up
—as well as when and how it should be backed up. For critical data, such as a database, you’ll
want to have redundant backup sets that extend back for several backup periods. For sensitive
data, you’ll want to ensure that backup data is physically secure or encrypted. For less important
data, such as daily user files, you won’t need such an elaborate backup plan, but you’ll need to
back up the data regularly and ensure that the data can be recovered easily.

What type of information does the data contain?

Data that doesn’t seem important to you might be very important to someone else. Thus, the type
of information the data contains can help you determine if you need to back up the data—as well
as when and how the data should be backed up.

How often does the data change?

The frequency of change can affect your decision on how often the data should be backed up. For
example, data that changes daily should be backed up daily.

Can you supplement backups with shadow copies?

Shadow copies are point-in-time copies of documents in shared folders. These point-in-time copies
make recovering documents easy, because you can quickly go back to an older version in case a
document is deleted or overwritten accidentally. You should use shadow copies in addition to
standard backup—not to replace backup procedures.

How quickly do you need to recover the data?

Time is an important factor in creating a backup plan. For critical systems, you might need to get
back online swiftly. To do this, you might need to alter your backup plan.

Do you have the equipment to perform backups?

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 68 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


You must have backup hardware to perform backups. To perform timely backups, you might need
several backup devices and several sets of backup media. Backup hardware includes tape drives,
optical drives, and removable disk drives. Generally, tape drives are less expensive but slower than
other types of drives.

Who will be responsible for the backup and recovery plan?

Ideally, someone should be a primary contact for the organization’s backup and recovery plan. This
person might also be responsible for performing the actual backup and recovery of data.

What’s the best time to schedule backups?

Scheduling backups when system use is as low as possible will speed the backup process. However,
you can’t always schedule backups for off-peak hours. So you need to carefully plan when key
system data is backed up.

Do you need to store backups off-site?

Storing copies of backup tapes off-site is essential to recovering your systems in the case of a
natural disaster. In your offsite storage location, you should also include copies of the software you
might need to install to reestablish operational systems.

SIGN –off Document

1. Implementation SummarySummary
Start Date 09/17/2018 Finish Date 09/20/2018

5. Document Signatures
Name Description Signature Date
Implementation Owner By signing this document, I 09/20/2018
Name acknowledge that I have received
all the stated deliverables at the
agreed to quality levels.

General Manager By signing this document, I 09/20/2018


Name acknowledge that I have delivered
all the stated deliverables at the
agreed to quality levels.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 69 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete


Assessment activities to be  Role Play and Report on planning and designing the
completed implementation of the network server solution
 For a full project outline, please refer to the student
assessment instructions
Resources required for the  Unit assessment guide template
unit assessment task  Access to live or simulated working environment
 Interaction with others
Does the candidate meet the Yes No Trainer/Assessor Comments
following criteria
Completed the template for
report

Discussed the requirements


with the stakeholders

Discussed the business


problems, opportunities and
budget

Explained Hazards and risks

Ensured everyone’s
participation in the role play

Discussed the clean-up and


restoration of the worksite

Analysed data migration


Australian Training School trading as Southern Academy of Business and Technology
Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 70 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


requirements

Analysed specifications for


network server

Analysed design and


configuration of network
services, applications and
security

Analysed the installation


checklist and prototype
design
Secured the sign –off from
the competent authority

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 71 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Unit Assessment Result Sheet (UARS)
Assessment Task 2 – Unit skills test (UST)
Student and Trainer/Assessor Details
Unit code ICTNWK505

Unit name Design, build and test a network server

Outcome of Unit First attempt:


Assessment Task (UAT)
Outcome (please make sure to tick the correct checkbox):
Satisfactory (S) ☐ or Not Satisfactory (NS) ☐

Date: _______(day)/ _______(month)/ ____________(year)


Second attempt:

Outcome (please make sure to tick the correct checkbox):


Satisfactory (S) ☐ or Not Satisfactory (NS) ☐
Date: _______(day)/ _______(month)/ ____________(year)
Feedback to Student First attempt:

 Second attempt:

Student Declaration  I declare that the answers I have provided are my own work.
Where I have accessed information from other sources, I have
provided references and or links to my sources.
 I have kept a copy of all relevant notes and reference material
that I used as part of my submission.
 I have provided references for all sources where the
information is not my own. I understand the consequences of
falsifying documentation and plagiarism. I understand how
the assessment is structured. I accept that all work I submit
must be verifiable as my own.
 I understand that if I disagree with the assessment outcome, I
can appeal the assessment process, and either re-submit
additional evidence undertake gap training and or have my
submission re-assessed.
 All appeal options have been explained to me.
Student Signature
Date 09/19/2018
Trainer/Assessor Name Gitam Lama
Trainer/Assessor I hold:
Declaration  Vocational competencies at least to the level being delivered

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 72 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 Current relevant industry skills
 Current knowledge and skills in VET, and undertake
 Ongoing professional development in VET
I declare that I have conducted an assessment of this candidate’s
submission. The assessment tasks were deemed current, sufficient,
valid and reliable. I declare that I have conducted a fair, valid, reliable,
and flexible assessment. I have provided feedback to the above-
named candidate.
Trainer/Assessor
Signature
Date
Office Use Only Outcome of Assessment has been entered onto the Student
Management System on _________________ (insert date)
by (insert Name) __________________________________

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 73 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Unit Pre-Assessment Checklist (UPAC)
UAT 3 – Unit Project (UP)
Purpose of the checklist
The pre-assessment checklist helps students determine if they are ready for assessment. The
trainer/assessor must review the checklist with the student before the student attempts the
assessment task. If any items of the checklist are incomplete or not clear to the student, the
trainer/assessor must provide relevant information to the student to ensure they understand the
requirements of the assessment task. The student must ensure they are ready for the assessment
task before undertaking it.
Section 1: Information for Students
 Please make sure you have completed the necessary prior learning before attempting this
assessment.
 Please make sure your trainer/assessor clearly explained the assessment process and tasks
to be completed.
 Please make sure you understand what evidence is required to be collected and how.
 Please make sure you know your rights and the Complaints and Appeal process.
 Please make sure you discuss any special needs or reasonable adjustments to be considered
during the assessment (refer to the Reasonable Adjustments Strategy Matrix and negotiate
these with your trainer/assessor).
 Please make sure that you have access to a computer and the internet (if you prefer to type
the answers).
 Please ensure that you have all the required resources needed to complete this Unit
Assessment Task (UAT).
 Due date of this assessment task is according to your timetable.
 In exceptional (compelling and compassionate) circumstances, an extension to submit an
assessment can be granted by the trainer/assessor.
 Evidence of the compelling and compassionate circumstances must be provided together
with your request for an extension to submit your assessment work.
 Request for an extension to submit your assessment work must be made before the due date
of this assessment task.

Section 2: Reasonable adjustments


 Students with carer responsibilities, cultural or religious obligations, English as an additional
language, disability etc. can request for reasonable adjustments.
 Please note, academic standards of the unit/course will not be lowered to accommodate the
needs of any student, but there is a requirement to be flexible about the way in which it is
delivered or assessed.
 The Disability Standards for Education requires institutions to take reasonable steps to
enable the student with a disability to participate in education on the same basis as a
student without a disability.
 Trainer/Assessor must complete the section below “Reasonable Adjustment Strategies
Matrix” to ensure the explanation and correct strategy have been recorded and
implemented.
 Trainer/Assessor must notify the administration/compliance and quality assurance
department for any reasonable adjustments made.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 74 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 All evidence and supplementary documentation must be submitted with the assessment
pack to the administration/compliance and quality assurance department.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 75 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Reasonable Adjustment Strategies Matrix (Trainer/Assessor to complete)
Category Possible Issue Reasonable Adjustment Strategy
(select as applicable)
 LLN  Speaking  Verbal assessment
 Reading  Presentations
 Writing  Demonstration of a skill
 Confidence  Use of diagrams
 Use of supporting documents such as wordlists
 Non-  Speaking  Discuss with the student and supervisor (if applicable)
English  Reading whether language, literacy and numeracy are likely to
Speaking  Writing impact on the assessment process
Background
 Cultural  Use methods that do not require a higher level of
background language or literacy than is required to perform the job role
 Confidence  Use short sentences that do not contain large amounts
of information
 Clarify information by rephrasing, confirm understanding
 Read any printed information to the student
 Use graphics, pictures and colour coding instead of, or to
support, text
 Offer to write down, or have someone else write, oral
responses given by the student
 Ensure that the time available to complete the
assessment, while meeting enterprise requirements, takes
account of the student’s needs
  Knowledge and  Culturally appropriate training
Indigenous understanding  Explore understanding of concepts and practical
 Flexibility application through oral assessment
 Services  Flexible delivery
 Inappropriate  Using group rather than individual assessments
training and  Assessment through completion of practical tasks in the
assessment field after demonstration of skills and knowledge.
 Age  Educational  Make sure font size is not too small
background  Trainer/Assessor should refer to the student’s experience
 Limited study  Ensure that the time available to complete the
skills assessment takes account of the student’s needs
 Provision of information or course materials in accessible
format.
 Changes in teaching practices, e.g. wearing an FM
microphone to enable a student to hear lectures
 Supply of specialised equipment or services, e.g. a note-
taker for a student who cannot write
 Changes in lecture schedules and arrangements, e.g.
relocating classes to an accessible venue
 Changes to course design, e.g. substituting an
assessment task
 Modifications to physical environment, e.g. installing

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 76 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Reasonable Adjustment Strategies Matrix (Trainer/Assessor to complete)
Category Possible Issue Reasonable Adjustment Strategy
(select as applicable)
lever taps, building ramps, installing a lift
  Reading  Discuss with the Student previous learning experience
Educational  Writing  Ensure learning and assessment methods meet the
background
 Numeracy student’s individual need
 Limited study
skills and/or
learning strategies
 Disability  Speaking  Identify the issues
 Reading  Create a climate of support
 Writing  Ensure access to support that the student has agreed to
 Numeracy  Appropriately structure the assessment
 Limited study  provision of information or course materials in accessible
skills and/or format, e.g. a text book in braille
learning strategies  Changes in teaching practices, e.g. wearing an FM
microphone to enable a student to hear lectures
 Supply of specialised equipment or services, e.g. a note
taker for a student who cannot write
 Changes in lecture schedules and arrangements, e.g.
relocating classes to an accessible venue
 Changes to course design, e.g. substituting an
assessment task
 Modifications to physical environment, e.g. installing
lever taps, building ramps, installing a lift

Explanation of reasonable adjustments strategy used (If required)

Unit Assessment Task (UAT)


Assessment Task 3 – Unit Project (UP)
Assessment type:
Unit Project (UP)

Assessment task description:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 77 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 This is the third (3) assessment task you have to successfully complete to be deemed
competent in this unit of competency.
 This assessment task requires you to complete a project.
 You will receive your feedback within two weeks - you will be notified by your
trainer/assessor when results are available.
 You must attempt all activities of the project for your trainer/assessor to assess your
competency in this assessment task.

Applicable conditions:
 This project is timed except activity 2.
 You must read and respond to all criteria of the project.
 You may handwrite/use computers to answer the criteria of the project.
 You must complete the task independently.
 No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
 As you complete this assessment task you are predominately demonstrating your practical
skills, techniques and knowledge to your trainer/assessor.
 The trainer/assessor may ask you relevant questions on this assessment task to ensure that
this is your own work.

Resubmissions and reattempts:


 Where a student’s answers are deemed not satisfactory after the first attempt, a
resubmission attempt will be allowed.
 You must speak to your Trainer/Assessor if you have any difficulty in completing this task and
require reasonable adjustments (e.g. can be given as an oral assessment).
 For more information, please refer to your RTO Student Handbook.

Location:
 This assessment task may be completed in a simulated learning environment.
 Your trainer/assessor will provide you further information regarding the location of
completing this assessment task.

General Instructions for attempting the project:


 This assessment task is in continuation to the previous task.
 You will be analyse the existing security plan, create new plan, encrypt the data, and check
the system log to check for data compromises in this assessment task.
 You will be expanding the knowledge and skills acquired during the previous assessment
task.
 Instructions analyse the existing security plan, create new plan, encrypt the data, and check
the system log to check for data compromises are provided within the assessment task.
 You will be required to correctly attempt all activities of this assessment task.

How your trainer/assessor will assess your work?


 This assessment task requires the student to successfully complete and submit a project.
 Answers must demonstrate the student’s understanding and skills of the unit.
 You will be assessed according to the provided performance checklist/ performance criteria.
 Assessment objectives/ measurable learning outcome(s) are attached as performance
checklist/ performance criteria with this assessment task to ensure that you have
successfully completed and submitted the assessment task.
 If all assessment tasks are deemed Satisfactory (S), then the unit outcome is Competent (C).
 If at least one of the assessment task is deemed Not Satisfactory (NS), then the unit outcome
is Not Yet Competent (NYC).

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 78 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


 Once all assessment tasks allocated to this Unit of Competency have been undertaken,
trainer/assessor will complete an Assessment plan to record the unit outcome. The outcome
will be either Competent (C) or Not Yet Competent (NYC).
 The “Assessment Plan” is available with the Unit Assessment Pack (UAP) – Cover Sheet.

Purpose of the assessment task:

This assessment task is designed to evaluate your following skills and abilities:
 Ability implement encryption systems and inform users of any impacts
 Skill to monitor and document encryption issues and compromises, and notify appropriate
person.

Assessment Task 3 - Unit Project (UP)


Instructions to complete this assessment task:
 Please write your responses in the template provided.
 You may attach a separate sheet if required.
 You must include the following particulars in the footer section of each page of the attached
sheets:
o Student ID or Student Name
o Unit ID or Unit Code
o Course ID or Course Code

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 79 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


o Trainer and assessor name
o Page numbers
 You must staple the loose sheets together along with the cover page.
 You must attach the loose sheets chronologically as per the page numbers.
 Correction fluid and tape are not permitted. Please do any corrections by striking through
the incorrect words with one or two lines and rewriting the correct words.
 The premise of the project must be closely related to the previous assessment task.
 This submission must be well presented and follow the guidelines and instructions provided.
 Please follow the format as indicated in the template section below.
 One of the most important steps that you can take: proofread your project.
 Project must be of 500-800 words in length, using 11-point font, double-spaced, and must
include a cover page, table of contents, introduction, body, summary or conclusion, and
works cited.
 Appropriate citations are required.
 All RTO policies are in effect, including the plagiarism policy.

Resources required to complete the assessment task:


 Computer
 Internet
 MS Word

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 80 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Activity 1 - (Implementation of the Network Server)

After the planning and documentation now the System Administrator/The student is required to
install the configure the server as per the requirements being defined in the scenario and in the
earlier tasks.

Note: For This activity RTO/Assessor will provide you the following:

 a site where server installation may be conducted


 relevant server specifications
 cabling
 networked (LAN) computers
 server diagnostic software
 switching equipment
 client requirements
 wide area network (WAN) service point of presence
 workstations
 relevant regulatory documentation that affects installation activities.

You need to implement the network server solution as per the given points:

 Install the Network operating system as per the specifications and installation checklist
(install Windows Server 2016)

 Install Antivirus and troubleshooting tools as additional tools and third party software
applications

 Patch and set the automatic updates for the Server Operating system to ensure security and
reliability.

 Configure the following server network and security services, including:

 domain name system (DNS)


 dynamic host configuration protocol (DHCP)
 web and proxy mail
 file transfer protocol (FTP)
 firewall.
 Restore the Backup on the server

 Implement the backup and restoration in case to avoid data damage during event of a
disaster

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 81 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

For Assessor/trainer

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 82 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Appendix 1
Configuring DHCP, DNS, web and proxy mail, FTP and Firewall

Appendix 2

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 83 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Appendix 3

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 84 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Appendix 4

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 85 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Appendix 5

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 86 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 87 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 88 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 89 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Configuring web proxy mail


Steps:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 90 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Installing Web application proxy

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 91 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 92 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 93 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 94 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

After confirmation we simply press configure to configure Web application proxy.

Configuring Firewall
Steps

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 95 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step2:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 96 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Steps 3:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 97 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Step 4

Step5:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 98 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Step 6:

Step 7:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 99 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step8:

Step 9:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 100 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step 10:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 101 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Configuring firewall has been done.

Appendix 6
Patch and set the automatic updates for the Server Operating system to ensure security and
reliability.

Steps

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 102 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 103 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Appendix 7

 Implement the backup and restoration in case to avoid data damage during event of a
disaster

Step 1: Adding Windows server Backup

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 104 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step 2: Installing Windows server backup

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 105 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step 4: Specify destination type

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 106 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step 5: Confirmation of Backup Schedule

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 107 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

After the Backup schedule wizard we perform Backup once wizard to select our data to be
backup

Step 1: Selecting Backup option

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 108 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step2: Select Backup configuration

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 109 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step 3: Specify Destination Type

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 110 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step 4: Specify Remote folder

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 111 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step 5: Confirmation of Backup once

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 112 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step 6: Backup progress

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 113 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

After backup once we perform recover process

Step 1: Selecting location for backup

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 114 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step 2: Specify location type

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 115 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Step3: Specify remote Folder

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 116 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

After we select the backup data and recover the same data which has been deleted by
accidentially.

Installing Antivirus program in virtual machine

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 117 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Finalizing antivirus in virtual machine.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 118 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete


Assessment activities to be  Implementation of the Network Server
completed  For a full project outline, please refer to the student
assessment instructions
Resources required for the  Unit assessment guide template
unit assessment task  Access to live or simulated working environment
 Interaction with others
Does the candidate meet the Yes No Trainer/Assessor Comments
following criteria
Installed the Server operating
system

Installed anti-virus and third


party software

Configured automatic update


services

Configured network and


security services

Configured backup and


restoration procedures

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 119 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Activity 2: (Test and troubleshoot the network servers)

Continuation to the previous tasks, you need to test and troubleshoot the network server. The
trainer/assessor will act as the IT Manager and will supervise all the testing procedures. And also the
RTO/assessor will provide you the following for the testing purpose:

 a site where server installation may be conducted


 relevant server specifications
 cabling
 networked (LAN) computers
 server diagnostic software
 switching equipment
 client requirements
 wide area network (WAN) service point of presence
 workstations
 relevant regulatory documentation that affects installation activities.

You need to test and troubleshoot the network servers as per the following:

 Test the network server as per the requirements and plan defined initially.
 Analyse the error reports and make changes
 Troubleshoot the network server using the network troubleshooting tools and techniques
 Test again as per the changes made and validate the changes as per the design and
implementation documentation
Template for TESTING NETWORK SERVER

Metrics Value Measured


CPU utilization 41% CPU usage
Physical Memory Percentage used 42% physical memory used
Memory 40% used
Java Virtual Machine (JVM) Total memories in the JVM runtime
Runtime/Total Memory
JVM Runtime/Free Memory Free memories in the JVM runtime
Used memories in the JVM runtime
JDBC Connections/Concurrent Waiters Number of threads that are currently waiting for
connections
JDBC DB Connections/Percent used Average percent of pool that is in use
JDBC DB Connections/Percent maxed Average percent of the time that all connections are in use
Thread Creates Total number of thread creates
Thread Destroys Total number of threads destroyed
Thread Pool/Active Threads Number of concurrently active threads
Thread Pool/Pool Size Average number of threads in pool
Thread Pool/Percent Maxed Average percent of the time that all threads are in use
Heap size Amount of heap allocated.

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 120 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Metrics Value Measured
Memory Memory utilization
Processes in run queue (Procs r), User Time (cpu us),
System time(cpu sy), Idle time (cpu id), Context Switching
(cs), Interrupts
Disk I/O Disk I/O utilization
Read/Write per sec (r/s, w/s), Percentage busy (%b),
Service Time (svc_t)
Network Collisions (Collis), Output Packets (Opkts), Input errors
(Ierrs), Input Packets (Ipkts)
Queue Depth Measurement of queue depths during the test execution

TASK 2:

Once the testing of the integrated server solution is done, you need to prepare a report on the
following in terms of the documentation of the network design and the installation. The report must
include the following:

 Changes made to the server including the following changes:

o Configuration changes

o Operational Changes

 Also complete this report including the server status and at the end you need to complete
the sign off the implementation process initiation from the General Manager and Chief
information Officer.

Template for Report on Network Server:

Background: To prepare the report on the basis of Network server, documentation of the
network design and the installation.
Configuration Changes:
May include a reliable way for knowing when, who, what, and how your device configurations
have changed. This will help you detect out-of-process and rogue changes, reconcile changes to
valid change requests, and ensure that actual changes were properly made. Look for solutions
which can detect config changes (in real-time if needed), permit configurable alerting options,
as well as show what changed in a config and who made the change. Also look for the ability to
create automated actions that self-correct and maintain a history of all changes and details.
You can verify whether or not the mapping is successful by one of the following methods:
1. Viewing the configuration spreadsheet from the Server Configuration tab. If the
mapping is not successful the problem information appears red for the particular server.
2. Viewing the Server Configuration Status from the Administration tab. If the mapping is
not successful, a message appears indicating that the server configuration is not valid, or the
server information is not complete. You are prompted to view the configuration spreadsheet to
determine where the problem occurs.
Operational changes to server:
May include the following:
Always know what devices are on your network, what devices are under management, and
what devices are under maintenance. Look for solutions that auto-discover devices, offer

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 121 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


customizable device profiles and track lifecycle metrics, including support and maintenance
eligibility, security alerts, warranty updates, and end-of service and life dates.
Multi-user access. Multi-user access means more than a pretty web UI. It also means that roles
and permissions can be securely delegated to individuals. Look for a solution which offers user
management (or integration with a directory service), the ability to assign users to roles, the
ability to associate roles with devices, and granular permissions to perform actions on
associated devices. Also look for workflows to manage communication and coordination
between users.
Server Status:
Check by using the flowing and include in report:
To find or view the log files that are generated by IIS, you must locate the folder that is used to
store these files. To find the folder and location for a log file, follow these steps:

1. Log on to the integration server computer as Administrator.


2. Click Start, point to Settings, and then click Control Panel.
3. Double-click Administrative Tools, and then double-click Internet Services Manager.
4. Click Properties to open the extended properties dialog box.
5. Click the General Properties tab. View the bottom of the window. IIS displays the format
and location of the log files that are generated. You can open and view the file and
viewed with WordPad, Microsoft Word, or another text file viewer.

SIGN –off Document

1. Implementation Summary Summary


Start Date 09/17/2018 Finish Date 09/17/2018

5. Document Signatures
Name Description Signature Date
Implementation Owner By signing this document, I 09/20/2018
Name acknowledge that I have received
all the stated deliverables at the
agreed to quality levels.

General Manager By signing this document, I 09/20/2018


Name acknowledge that I have delivered
all the stated deliverables at the
agreed to quality levels.

For Assessor/trainer

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 122 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Appendix 7

Appendix 8

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 123 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Appendix 9

Appendix 10

Perfomance monitoring

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 124 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 125 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Performance criteria checklist for unit assessment task:

Trainer/ Assessor to complete


Assessment activities to be  Test and troubleshoot the network servers
completed  For a full project outline, please refer to the student
assessment instructions
Resources required for the  Unit assessment guide template
unit assessment task  Access to live or simulated working environment
 Interaction with others
Does the candidate meet the Yes No Trainer/Assessor Comments
following criteria
Tested the network server

Analysed the errors

Troubleshoot the network


server

Tested the changes made by


completing the template

Completed the report on server

Checked the server status

Got approval by sign off from


the authority

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 126 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Unit Assessment Result Sheet (UARS)
Assessment Task 3 – Unit skills test (UST)
Student and Trainer/Assessor Details
Unit code ICTNWK505
Unit name Design, build and test a network server

Outcome of Unit First attempt:


Assessment Task (UAT)
Outcome (please make sure to tick the correct checkbox):
Satisfactory (S) ☐ or Not Satisfactory (NS) ☐

Date: _______(day)/ _______(month)/ ____________(year)


Second attempt:

Outcome (please make sure to tick the correct checkbox):


Satisfactory (S) ☐ or Not Satisfactory (NS) ☐
Date: _______(day)/ _______(month)/ ____________(year)
Feedback to Student First attempt:

 Second attempt:

Student Declaration  I declare that the answers I have provided are my own work.
Where I have accessed information from other sources, I have
provided references and or links to my sources.
 I have kept a copy of all relevant notes and reference material
that I used as part of my submission.
 I have provided references for all sources where the
information is not my own. I understand the consequences of
falsifying documentation and plagiarism. I understand how
the assessment is structured. I accept that all work I submit
must be verifiable as my own.
 I understand that if I disagree with the assessment outcome, I
can appeal the assessment process, and either re-submit
additional evidence undertake gap training and or have my
submission re-assessed.
 All appeal options have been explained to me.
Student Signature
Date
Trainer/Assessor Name Gitam lama
Trainer/Assessor I hold:

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 127 of 128
ICTNWK505 - Design, build and test a network server

Student Assessment Pack


Declaration  Vocational competencies at least to the level being delivered
 Current relevant industry skills
 Current knowledge and skills in VET, and undertake
 Ongoing professional development in VET
I declare that I have conducted an assessment of this candidate’s
submission. The assessment tasks were deemed current, sufficient,
valid and reliable. I declare that I have conducted a fair, valid, reliable,
and flexible assessment. I have provided feedback to the above-
named candidate.
Trainer/Assessor
Signature
Date
Office Use Only Outcome of Assessment has been entered onto the Student
Management System on _________________ (insert date)
by (insert Name) __________________________________

Australian Training School trading as Southern Academy of Business and Technology


Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 128 of 128

You might also like