Asignment 505 Zangbu
Asignment 505 Zangbu
Asignment 505 Zangbu
Student Declaration
I certify that the work submitted for this assessment pack is my own. I have clearly
referenced any sources used in my submission. I understand that a false declaration is a form
of malpractice;
I have kept a copy of this assessment pack and all relevant notes, attachments, and reference
material that I used in the production of the assessment pack;
For the purposes of assessment, I give the trainer/assessor of this assessment the permission
to:
o Reproduce this assessment and provide a copy to another member of staff; and
o Take steps to authenticate the assessment, including communicating a copy of this
assessment to a checking service (which may retain a copy of the assessment on its
database for future plagiarism checking).
Assessment Plan
To demonstrate competence in this unit, you must be assessed as satisfactory in each of the
following assessment tasks.
Trainer/Assessor
Signature
Assessment Conditions
Unit purpose/application
This unit describes the skills and knowledge required to design, install and test a server in a complex
network environment.
It applies to individuals who are employed in network or systems engineering roles, such as network
engineers who are required to design and build network servers in a complex computing
environment of medium-to-large organisations.
No licensing, legislative or certification requirements apply to this unit at the time of publication
What the student can expect to learn by studying this unit of competency
Plagiarism
Plagiarism means to take and use another person's ideas and or manner of expressing them and to pass
them off as your own by failing to give appropriate acknowledgement. This includes material sourced
from the internet, RTO staff, other students, and from published and unpublished work.
Plagiarism occurs when you fail to acknowledge that the ideas or work of others are being used, which
includes:
Paraphrasing and presenting work or ideas without a reference
Copying work either in whole or in part
Presenting designs, codes or images as your own work
Using phrases and passages verbatim without quotation marks or referencing the author or
web page
Reproducing lecture notes without proper acknowledgement.
Collusion
Collusion means unauthorised collaboration on assessable work (written, oral or practical) with other
people. This occurs when a student presents group work as their own or as the work of someone else.
Unit outcome
This unit is not graded and the student must complete and submit all requirements for the
assessment task for this cluster or unit of competency to be deemed competent.
Students will receive a 'satisfactorily completed' (S) or 'not yet satisfactorily completed (NS)
result for each individual unit assessment task (UAT).
Final unit result will be recorded as competency achieved/competent (C) or competency not
yet achieved/not yet competent (NYC).
Prerequisite/s
Nil
Co-requisite/s
Nil
The Foundation Skills describe those required skills (learning, oral communication, reading, writing,
numeracy, digital technology and employment skills) that are essential to performance. Foundation skills
essential to performance are explicit in the performance criteria of this unit of competency.
Relevant Legislation
All assessment tasks will ensure that the principles of assessment and rules of evidence are adhered
to.
The principles of assessment are that assessment must be valid, fair, flexible, reliable and consistent.
The rules of evidence state that evidence must be sufficient, valid, current and authentic.
AQF Level
AQF levels and the AQF levels criteria are an indication of the relative complexity and/or depth of
achievement and the autonomy required to demonstrate that achievement.
All assessment tasks must ensure compliance with the requirements of AQF level and the AQF level
criteria. For more information, please visit http://www.aqf.edu.au/
Further Information
Feedback defines for students what their trainer/assessor thinks is important for a topic or a subject.
At its best, feedback should:
• Be provided for each Unit Assessment Task (UAT)
• Guide students to adapt and adjust their learning strategies
• Guide trainers/assessors to adapt and adjust teaching to accommodate students’ learning
needs
• Be a pivotal feature of learning and assessment design, not an add-on ritual
• Focus on course and unit learning outcomes
• Guide students to become independent and self-reflective learners and their own critics
• Acknowledge the developmental nature of learning.
If students have not received proper feedback, they must speak to compliance and quality assurance
department/administration department in the RTO/person responsible for looking after the quality
and compliance services of the RTO.
Assessment type:
Written Questions
Applicable conditions:
All knowledge tests are untimed and are conducted as open book tests (this means you are
able to refer to your textbook during the test).
You must read and respond to all questions.
You may handwrite/use computers to answer the questions.
You must complete the task independently.
No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
As you complete this assessment task you are predominately demonstrating your written
skills and knowledge to your trainer/assessor.
The trainer/assessor may ask you relevant questions on this assessment task to ensure that
this is your own work.
Location:
This assessment task may be completed in a learning management system (i.e. Moodle) or
independent learning environment.
Your trainer/assessor will provide you further information regarding the location for
completing this assessment task.
The purpose of this assessment task is to assess the students’ knowledge required for the
designing and implementation of a network server.
The purpose of this assessment task is to assess the students’ knowledge required to ensure secure
file encryption is selected, implemented and monitored on a computer network or local
environment.
To make full and satisfactory responses you should consult a range of learning resources,
other information such as handouts and textbooks, learners’ resources and slides.
All questions must be answered in order to gain competency for this assessment.
You may attach a separate sheet if required.
You must include the following particulars in the footer section of each page of the attached
sheets:
o Student ID or Student Name
o Unit ID or Unit Code
o Course ID or Course Code
o Trainer and assessor name
o Page numbers
You must staple the loose sheets together along with the cover page.
You must attach the loose sheets chronologically as per the page numbers.
Correction fluid and tape are not permitted. Please do any corrections by striking through
the incorrect words with one or two lines and rewriting the correct words.
Learner guide
PowerPoint presentation
Unit Assessment Pack (UAP)
Access to other learning materials such as textbooks
Access to a computer, the Internet and word-processing system such as MS Word.
A network operating system is an operating system designed for the sole purpose of
supporting workstations, database sharing, application sharing and file and printer access
sharing among multiple computers in a network. Certain standalone operating systems, such
as Microsoft Windows NT and Digital’s OpenVMS, come with multipurpose capabilities and
can also act as network operating systems. SUPPORT The first characteristic of network
operating systems is the support component. Network operating systems provide support for
the multiple processors, applications, and hardware devices that make up a network. The
systems support the users accessing the network as well as process requests for specific
documents and usage of hardware. NOSs also provide protocol requests from users,
including Transmission Control Protocol/Internet Protocol (TCP/IP) and other protocols.
Controls Support The second characteristic of network operating systems is the security
component. NOSs manage the authorization and authentication of users, computer
workstations, and other devices accessing a network. Irfan intruder tries to access a
network, the NOS blocks the unauthorized user/computer and logs the intrusion attempt
within its log files. The NOS also manages software and hardware installations to keep users
from installing unauthorized software and devices.
Setup The third characteristic of network operating systems is the user setup component.
Network operating systems create user accounts and manage the user logging into and out
of the network. The systems also manage what file and directory services a specific user has
access to, users accessing the network remotely, and how the networks graphical interface
looks to specific users.
Printing and File Services The fourth characteristic of network operating systems is the
printing and file services component. Like other operating systems, network operating
systems manage all printing, storage, backup, and duplication services for computers and
users accessing a network. The systems also control access to the Internet, local-area
(LAN) and wide-area networks (WAN), port routing, and internal web services known as
Intranet. An NOS filters documents and files through the printing/file services immediately.
More than one user can send documents and files through the network for printing, backing
up, or other types of processing.
EMAIL SERVICES The Fifth and final characteristic of network operating systems is the
email component. An NOS manages electronic mail, also known as email, for the entire
network, including users accessing the NOS remotely and from the Internet. The NOS
blocks SPAM and other problematic emails and sends/receives email, as well as lets user use.
Software compatibility can refer to the compatibility that a particular software has running on
a particular CPU architecture such as Intel or PowerPC. Software compatibility can also refer
to ability for the software to run on a particular operating system. Very rarely is a compiled
software compatible with multiple different CPU architectures. Normally, an application is
compiled for different CPU architectures and operating systems to allow it to be compatible
with the different system. Interpreted software, on the other hand, can normally run on many
different CPU architectures and operating systems if the interpreter is available for the
architecture or operating system. Software incompatibility occurs many times for new
software released for a newer version of an operating system which is incompatible with the
older version of the operating system because it may miss some of the features and
DNS: The Domain Name System (DNS) is the phonebook of the Internet. People get to data online
through space names, as nytimes.com or espn.com. Internet browsers connect through Internet
Protocol (IP) addresses. DNS makes an interpretation of area names to IP addresses so programs
can stack Internet assets. Every gadget associated with the Internet has a remarkable IP address
which different machines use to discover the gadget. DNS servers kill the requirement for people
to retain IP tends to, for example, 192.168.1.1 (in IPv4), or more mind boggling more up to date
alphanumeric IP addresses.
DHCP: Every gadget on a TCP/IP-based system must have an interesting unicast IP deliver to get to
the system and its assets. Without DHCP, IP addresses for new PCs or PCs that are moved starting
With DHCP, this whole procedure is computerized and overseen halfway. The DHCP server keeps
up a pool of IP locations and leases a deliver to any DHCP-empowered customer when it begins up
on the system. Since the IP addresses are dynamic (rented) as opposed to static (forever doled
out), addresses never again being used are consequently come back to the pool for reallocation.
FTP: The File Transfer Protocol (FTP) is a standard system convention utilized for the exchange of
PC records between a customer and server on a PC organize. FTP is based on a customer server
show engineering separate control and information associations between the customer and the
server. FTP clients may verify themselves with an unmistakable textsign-in convention, typically as
a username and secret phrase, yet can associate namelessly if the server is designed to permit it.
For secure transmission that ensures the username and secret word, and scrambles the substance,
FTP is frequently anchored with SSL/TLS (FTPS) or supplanted with SSH File Transfer Protocol
(SFTP). The primary FTP customer applications were direction line programs created before
working frameworks had graphical UIs, are still delivered with most Windows, Unix, and Linux
working frameworks.
Mail: E-mail (electronic mail) is the trading of PC put away messages by media transmission. (A few
productions spell it email; we incline toward the as of now more settled spelling of email.) E-mail
messages are normally encoded in ASCII content. Be that as it may, you can likewise send non-
content records, for example, realistic pictures and sound documents, as connections sent in
twofold streams. Email was one of the principal employments of the Internet is as yet the most
prominent utilize. A vast level of the aggregate movement over the Internet is email. Email can
likewise be traded between online specialist co-op clients and in systems other than the Internet,
both open and private.
System Time Protocol (NTP): It is a systems administration convention for clock synchronization
between PC frameworks over bundle exchanged, variable-dormancy information systems. In
activity since before 1985, NTP is one of the most seasoned Internet conventions in flow utilize.
NTP was planned by David L. Factories of the University of Delaware.
NTP is planned to synchronize every single taking an interest PC to inside a couple of milliseconds
of Coordinated Universal Time (UTC).It utilizes the crossing point calculation, a changed form of
Marzullo's calculation, to choose precise time servers and is intended to alleviate the impacts of
variable system dormancy. NTP can as a rule keep up time to inside several milliseconds over
general society Internet, and can accomplish superior to one millisecond precision in
neighborhood under perfect conditions. Unbalanced courses and system clog can cause blunders
of 100 ms or more.The convention is normally portrayed as far as a customer server demonstrate,
yet can as effectively be utilized in shared connections where the two companions view alternate
as a potential time source.
SMB: In PC organizing, Server Message Block (SMB), one rendition of which was otherwise called
Common Internet File System (CIFS,/sɪfs/) works as an application-layer arrange convention.
Predominantly utilized for giving shared access to records, printers, and serial ports and random
correspondences between hubs on a system. It additionally gives a validated between process
correspondence component. Most use of SMB includes PCs running Microsoft Windows, where it
was known as "Microsoft Windows Network" before the presentation of Active Directory. Relating
Windows administrations are LAN Manager Server (for the server segment) and LAN Manager
Workstation (for the customer segment).
WEB: The Web is the regular name for the World Wide Web, a subset of the Internet comprising
of the pages that can be gotten to by a Web program. Numerous individuals accept that the Web
is the same as the Internet, and utilize these terms conversely. Be that as it may, the term Internet
really alludes to the worldwide system of servers that makes the data sharing that occurs over the
Web conceivable. Thus, despite the fact that the Web makes up a vast bit of the Internet, however
they are not one and same.
Start: Start is called on the frame when a script is enabled just before any of
the Update methods are called the first time. Like the Awake function, Start is
called exactly once in the lifetime of the script. However, Awake is called when
the script object is initialised, regardless of whether or not the script is
enabled. Start may not be called on the same frame as Awake if the script is
not enabled at initialisation time.
Stop: Use these functions to return a warning or error from another function.
The warning function will output a message after a function finishes, while
the stop function both stops the execution of the function and outputs an error
message.
Identity
Accurate and positive identification of network users, hosts, applications,
services, and resources is a must. Kerberos, password tools, and protocols such
as RADIUS and TACACS+ enable identification.
Perimeter security
This enables you to control access to network applications, data, and services
so only authorised users and information can pass through the network.
Data privacy
Data privacy is the providing of confidential data on command to authorised
users while protecting that information from eavesdropping or tampering.
Tunnelling, encryption technologies, and protocols like IPSec provide important
protection when implementing Virtual Private Networks (VPNs).
Security monitoring
You also should regularly test and monitor security preparations. By being
proactive, you can identify areas of weakness and make adjustments. When a
real security event occurs, you’ll be ready.
Policy management
It’s likely your network will grow in size and complexity. You’ll need centralised
policy-management tools that use directory services to grow with the network.
These tools define, distribute, enforce, and audit the security policy through
browser interfaces, plus they enhance the usability and effectiveness of your
A. What are the two (2) network troubleshooting tools and techniques? Write your
response in 100-150 words.
B. What are the five (5) network diagnostic utilities? Write 30-50 words for each.
One of the most important things that must be completed when troubleshooting a
networking issue is to find out the specific IP configuration of the variously affected
statically, but when a dynamic addressing method is used, the IP address of each
host can potentially change often. The utilities that can be used to find out this IP
configuration information include the ipconfig utility on Windows machines and the
Ping
The most commonly used network tool is the ping utility. This utility is used to
destination host. This is done by using the Internet Control Message Protocol
(ICMP) which has the ability to send an echo packet to a destination host and a
mechanism to listen for a response from this host. Simply stated, if the
requesting host receives a response from the destination host, this host is
is down at an office, the ping utility can be used to figure out whether the
problem exists within the office or within the network of the Internet provider.
Figure 1 below shows an example of the ping utility being used to obtain the
Ping Scan : Utility to scan a range of IP's to check if the given range of IP
Australian Training School trading as Southern Academy of Business and Technology
Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 19 of 128
ICTNWK505 - Design, build and test a network server
Trace Route : Utility to record the route (route is calculated in terms of hops, i.e
number of routers it crosses) through the network between the sender's IP and
a specified destination IP. The user can configure the settings such as number
of hops, and timeout value.
A. Briefly explain the importance of the following installation media in 30-50 words each.
a. CD
b. DVD
c. universal serial bus (USB)
d. boot disk
e. network and script (automated install)
f. deployment services
B. Briefly explain boot process and diagnosing boot failures related to network server. Answer
in 50-100 words.
C. Briefly explain operating system rescue environment related to network server. Answer in 50-
100 words.
a. CD:
A compact disc is a portable storage medium that can be used to record, store and
play back audio, video and other data in digital form. A standard compact disc
measures 4.7 inches, or 120 millimeters (mm), across, is 1.2 mm thick, weighs
between 15 grams and 20 grams, and has a capacity of 80 minutes of audio, or
650 megabytes (MB) to 700 MB of data.
b. DVD:
DVD is an optical disc technology with a 4.7 gigabyte storage capacity on a single-
d. boot disk:
A boot disk is a removable data storage medium used to load and boot
an operating system or utility program. Typically, a boot disc is a read-only
medium that stores temporary files on a CD-ROM or floppy disc drive. Other boot
disk mediums include USB drives, zip drives, and paper tape drives.
One of the most common uses of a boot disk is to start the computer when the
operating on the internal hard drive does not load. Generally, a boot disk contains
a full-scale operating system, and may include a small utility operating system as
well. In recent years, boot disks have become less common as original equipment
manufacturers turn to using hard drive partitions to store recovery data.
f. deployment services:
Windows Deployment Services is a server role that gives administrators the ability
Diagnosing PC bootup problems can be the most difficult of tasks for several
reasons. Diagnosis requires logical reasoning, which in itself requires that the
person doing the diagnosis understand the system events that are supposed to
occur, and in which order. Further, many of the clues that might be available
require specialized diagnostic equipment that the average user does not possess.
Fortunately, even without the use of diagnostic tools, the most common boot-time
errors can be resolved by with a little knowledge, a few common components and
a bit of patience.
The BIOS (Basic I/O System) is the very first program run by the PC, and resides in
a ROM chip (Read Only Memory), which is also called Non-Volatile memory. The
BIOS program initializes the standard devices, such as the memory controller,
video controller, IDE controller and floppy controller. Using stored parameters, it
initializes the motherboard chipset, and sets timing parameters. It also creates an
interrupt vector table and provides a set of services, accessible through interrupts,
that allow access to the standard I/O devices. Following is a brief description of the
entire PC boot process, which can be extremely helpful in identifying and resolving
problems.
What follows in this section may help you recover from a problem at some point?
A copy of these instructions is also available as rescue.txt on your Red Hat Linux
6.0 CD-ROM.
As the name implies, rescue mode is there to rescue you from something. In
However, there may be times when you are unable to get Linux running
completely enough to access its files on your system's hard drive. By using rescue
mode, it's possible to access the files stored on your system's hard drive, even if
you can't actually run Linux from that hard drive
A. Briefly explain the importance of operating system help and support utilities in network
server environment. Answer in 50-100 words.
B. Briefly explain two performance monitoring tools and tuning options related to Windows
server 2012. Answer in 50- 100 words.
C. Briefly explain two compatibility issues and resolution procedures related to Windows server
2012.
D. List and explain three high availability options for servers. Answer in 50-100 words.
E. Briefly explain file and print management in 50-100 words.
A) All computers ship with software called an operating system (O/S) to manage all
the software and hardware on the computer and to provide an interface that humans
can use to interact with the machines. A modern O/S contains much built-in software
designed to simplify the networking of a computer. Typical O/S software includes an
implementation of TCP/IP protocol stack and related utility programs like ping and
traceroute, along with the necessary device drivers and other software to
automatically enable a device's Ethernet or wireless interface. The operating
systems of mobile devices normally provide the programs needed to enable Wi-
Fi, Bluetooth or other wireless connectivity. operating system specifically designed
to run on servers, which are specialized computers that operate within
a client/server architecture to serve the requests of client computers on the network.
The server operating system, or server OS, is the software layer on top of which
other software programs, or applications, can run on the server hardware. Server
operating systems help enable and facilitate typical server roles such as Web server,
mail server, file server, database server, application server and print server.
B)
Tool Description
SQL Server Microsoft SQL Server Distributed Replay can use multiple computers to repla
Monitor System Monitor primarily tracks resource usage, such as the number of buff
Resource Usage requests in use, enabling you to monitor server performance and activity us
(System and counters or user-defined counters to monitor events. System Monitor (P
Monitor) Microsoft Windows NT 4.0) collects counts and rates rather than data about
example, memory usage, number of active transactions, number of blocked
activity). You can set thresholds on specific counters to generate alerts that
The key difference between SQL Server Profiler and System Monitor is that S
monitors Database Engine events, whereas System Monitor monitors resour
with server processes.
C) Two (2) Windows Server 2016 compatibility issues and their resolution procedures
are:
Server Core installation option: When you install Windows Server 2016 by
using the Server Core installation option, the print spooler is installed and
starts by default even when the Print Server role is not installed.
To avoid this, after the first boot, set the print spooler to disabled.
One of our existing customers was looking for a high-end game server to host
flash games with encoded PHP and MySQL server as a backend.
To achieve the highest availability, they demanded 2 load balancers with failover.
Each of them contains 2 web servers and a database server
Load Balancing
The process of distributing incoming web traffic across a group of servers efficiently
and without intervention is called Load Balancing. A hardware or software appliance
which provides this load balancing functionality is known as a Load Balancer. A load
balancer sits in front of your servers and routes the visitor requests across the
servers. It ensures even distribution, i.e., all requests must be fulfilled in a way that it
maximizes speed and capacity utilization of all servers and none of them is over or
under-utilized.
E)Print servers are used provide access to printers across the network. They offer an
added level of manageability for network printing and allow an administrator to
control when print devices can be used by scheduling the availability of printers,
setting priority for print jobs and configuring printer properties. An administrator can
also view, pause, resume, and/or delete print jobs and manage printers remotely and
by using Windows Management Instrumentation (WMI), which allows an
administrator to manage components like print servers and print devices from the
command line.
File servers are used to store data in a central location, so they must be kept secure
to ensure that only those who are authorised are able to use the files. The volumes
on a file server should be formatted with NTFS to allow file and folder permissions to
be set and the Encrypting File System (EFS) should be used to guard against
unauthorised users and malicious programs. Although encryption and decryption can
be complex, EFS file encryption is completely transparent to the user. However, you
cannot encrypt system files and you cannot share encrypted. Encrypted files cannot
be compressed and compressed files will be decompressed when you encrypt them.
File servers allow users to store their files remotely, rather than on their local hard
disks, and share them with other users. When a file is saved to a file server, clients
who have access to the relevant directory can access it remotely. File servers are
also important when multiple employees use network-accessible applications and
data may need to be saved to a shared database, spreadsheet or other type of file
Disk partition is really only a logical separation from the whole drive, but
it appears as though the division creates multiple physical drives. Some terms
you'll see associated with a partition include primary, active, extended, and
logical partitions. More on this below. Partitions are also sometimes called disk
partitions and when someone uses the word drive, they usually mean a
partition with a drive letter assigned. Dividing a hard drive into partitions is
Australian Training School trading as Southern Academy of Business and Technology
Level 1 and 4 Bathurst Street Sydney NSW 2000 | Phone: 1300 852 205 | RTO Code: 31595 | CRICOS Provider Code: 03602E
ICTNWK505 - Design, build and test a network server: Student Assessment Task
Version : 1.2 Last Updated : 22 December 2017 Next Update: 22 December 2018 Page 27 of 128
ICTNWK505 - Design, build and test a network server
For example, when you install an operating system like Windows, part of the
process is to define a partition on the hard drive. This partition serves to define an
area of the hard drive that Windows can use to install all of its files. In Windows
operating systems, this primary partition is usually assigned the drive letter of "C".
Question 9: Explain the processes involved in managing the project including the following:
A. Documentation skills required for networks
B. Task management
C. Task scheduling utilities.
Write 100-150 words for each in your response.
Ideally, you want this map of the network's topology to include each network
segment, the routers connecting the various segments, and the servers, gateways
and other major pieces of networking hardware that are connected to each
segment. For larger networks, you may have to create a general segment map and
make more specific maps of each individual segment.
When a server fails, the failure can often be traced to a recent change. As a part of
the network documentation, consider making a log book for each server for
documenting changes such as patch and application installations and modified
security settings. Not only will the log help you troubleshoot future problems, it
can help you rebuild the server in the event of a catastrophic failure.
Document the applications and their versions running on each server. You might
also include a copy of the software license or a receipt within this documentation
just in case your customer becomes involved in a software audit.
I have talked about documenting individual servers, but it's equally important to
document switches, routers, gateways and other networking hardware. The
documentation should include information such as:
Where the various servers exist within the Active Directory hierarchy.
Backup is your customer's best defense against a catastrophe, but it will do little
good if nobody can figure out how to use it. Be sure to document the backup
software used and its version (very important). You will also want to document the
tape rotation scheme, a general description of what's included in each backup job
and where the backup tapes are stored.
B) Task management is the process of managing a task through its life cycle. It
involves planning, testing, tracking, and reporting. Task management can help
either individual achieve goals, or groups of individuals collaborate and share
knowledge for the accomplishment of collective goals. Tasks are also
differentiated by complexity, from low to high. Effective task management
requires managing all aspects of a task, including its status, priority, time,
human and financial resources assignments, recurrence, dependency,
notifications and so on. Managing multiple individuals or team tasks may be
assisted by specialized software, for example workflow or project management
software. In fact, many people believe that task management should serve as
a foundation for project management activities.
Task management may form part of project management and process
management and can serve as the foundation for efficient workflow in an
organization. Project managers adhering to task-oriented management have a
detailed and up-to-date project schedule, and are usually good at directing
team members and moving the project forward
A: What is the importance of consultation with the key stakeholders and how does it help to
effectively coordinate the task? Write your response in 100-150 words.
B: What is the importance of the Work Health and Safety (WHS) processes and procedures at a
workplace? Write your response in 100-150 words.
The main importance of consultation with the key stakeholders are given below:
Firstly, decision making will be more informed and in tune with those who the actions will affect.
Secondly, there will be greater satisfaction from stakeholders with the outcome. Through the
engagement process, those who decisions will affect will feel they have inputted into the final
outcome and that everyone’s views have been taken into account. Depending on the method of
consultation, they will also understand that their perspective may not be shared by all and that there
B) Health and safety are two words people tend to take rather seriously – and
understandably so. They play a vital role in your well-being and overall quality
of life. When it comes to the business world, health and safety protocol should
be at the top of any executive priority list. These processes are just as
important as sales and marketing to the successes and failures of any
company.
A. What are the different factors to consider while securing approval of an ICT project? Write your
response in 50-100 words.
B. What are the factors to consider while designing a client report? Write your response in 100-150
words.
The different factors to thought whereas securing approval of AN ICT project are:
A title, spoken language what it's that you simply wish the consumer or
govt to approve (a style set up, a form, a templet etc.). A relevancy the role
this document can play in AN over-all project or system.
A description of what's being united to together with an outline of what has
been reviewed.
A rationalization of however any later changes to the documentation could
also be handled once the shape has been signed.
In cases wherever work has been done beneath contract, particularly for AN
agreed-to deliverable, permission to issue AN invoice may also be enclosed.
Space for linguistic communication and chemical analysis.
B) The factors to be consider whereas designing consumer report are as
Agree before you write- Establish report temporal order and content at the
beginning of your consumer engagement. each engagement are completely
different. For long comes, your consumer might like a monthly telephony, weekly
Writing for audience. The report should be written on the idea what the audience wish
or wish to scan. The question they need are answered or not should be taken under
consideration.
A. What are the factors to consider while preparing the documentation for server
configuration and operational changes? Write your response in 100-150 words.
B. What are the benefits of cleanup and restoration of an ICT worksite as per client’s
satisfaction? Write your response in 150-200 words.
Answers: The server documentation tool XIA Configuration discovers your Windows
machines and documents their configuration. This helps organizations retain
information about environments, transfer knowledge, and save time otherwise
spent performing these tasks manually.
Agree before you write- Establish report temporal order and content at the
beginning of your consumer engagement. each engagement is completely
different. For long comes, your consumer might like a monthly telephony, weekly
email summaries, and a quarterly report. Some purchasers might want a brief
weekly report and an additional comprehensive monthly report. Establish up front
the frequency, method, and detail of communications.
Write a powerful Summary- Even with up front agreement, some purchasers,
notably senior level managers, might not have time to scan the complete report.
Use AN “executive summary” format that may simply stand alone to speak the
numerous components of the report, together with onerous facts and figures
Writing for audience. The report should be written on the idea what the audience wish
or wish to scan. The question they need are answered or not should be taken under
consideration.
A. What are the steps included in validating changes for a system? Write 100-150 words.
B. Explain the importance of server testing? Write your answer in 30-50 words.
Controlling the changes is the process of managing how changes are introduced
Question 14: How to test the network server return error code 1603 and how to solve this error?
Add snapshots.
* Syntax
Parameter Set: CommonTCPPort
Test-NetConnection [[-ComputerName] <String> ] [-CommonTCPPort] <String> [-
InformationLevel <String> ] [ <CommonParameters>]
Step 1: Generate a verbose log file named msi*.log in the %temp% directory
the next time the setup package is executed. (Click here to know more ways to
generate log). Know more about the command-line switches here.
Step 3: Review the contents of the log file immediately above the “return value 3”
string to determine which custom action or standard action failed. Depending on
which action is failing, We will need to proceed to more detailed debugging from
here.
Question 15: Explain the process of error reporting in Microsoft Windows Server? Write your
answer in 100-150 words.
In addition to data flexibility and persistency, a platform-as-a-service (PaaS)
offering managed by Azure was more appealing than the alternatives for the
Microsoft Error Reporting team. Microsoft Error Reporting already made
extensive use of other Azure services, such as Azure SQL Database, Azure Blob
storage, and Azure Queue storage, so consolidating on Azure with the move to
Document DB helped the Microsoft Error Reporting team simplify its
management. It also allowed the team to move away from on-premises
hardware.
In the past, the Microsoft Error Reporting team had to invest heavily in costly,
space-consuming, and energy-consuming on-premises servers. Embracing
Document DB has enabled the Microsoft Error Reporting team to greatly simplify
its architecture, paring down one key component from 30 servers in the recent
past to a single web endpoint today. This simplified architecture directly translates
into efficiency for the Microsoft Error Reporting team. Previously, the team relied
on SQL Server gurus to carefully curate Microsoft Error Reporting data and on
database administrators to continuously maintain the databases on the internal
servers. Handing all of its database management over to Azure has freed up the
team’s resources to focus on development. It has also made it easier for the team
to try new things: rather than IT management being a bottleneck for experiments,
the Azure PaaS offering enables the Microsoft Error Reporting team to experiment
with more agility, such as by incorporating new types of data into its analyses.
Question 16: What are the seven (7) factors to consider while analysing and documenting the data
migration requirements? Write your answer in 100-150 words.
Factors to consider during a data migration project include how long the migration will take;
the amount of downtime required; and the risk to the business due to
technical compatibility issues, data corruption, application performance issues, and missed
data or data loss.
Question 17: Explain the following terms in 30-100 words for each:
A. Business problems
B. Opportunities
C. Scope
D. Budget
A. Business problems
Financial management
Many CEOs i do know are concepts people; meaning they’re nice at the
massive image and unquiet thinking, however less sensible with things like
income, profit margins, reducing prices, financing, etc. little and medium
businesses might not need a full-time corporate executive, however would
do higher to use a money advisor United Nations agency will step into the
role as required.
Monitoring performance
Using an important set of rounded performance indicators that offer the
business with insights concerning however well it's playing is essential.
Most business individual’s i do know aren't consultants in the way to
develop KPIs, the way to avoid the key pitfalls and the way to best
communicate metrics so they inform decision-making. In most cases
corporations admit too straightforward finance indicators that simply
occlude the company reportage channels.
B. Opportunities
It is an appropriate or favourable time or occasion: Their meeting afforded
an opportunity to exchange views. a situation or condition favourable for
attainment of a goal. a good position, chance, or prospect, as for
advancement or success. It is simply a chance to have something that we
have been trying to during the life. People get opportunity to do business or
C.Scope
Its means an application of something in the market. Suppose we are about
to start a business, then we have to know the scope of that business in the
present situation or future. People consider something to do after knowing
the scope of that particular activity in their life. At present situation every
people concerns about scope of any things they do in their life. Another
meaning of the scope is it is an instrument or device that is used by military
person in the gun, sniper etc.
D.Budget
A budget is normally called capital over a specified future period of time. It
is also a revenue or expenses for certain business. It is compiled and re-
evaluated on a periodic basis. Budgets can be made for a person, a family,
a group of people, a business, a government, a country, a multinational
organization or just about anything else that makes and spends money. At
companies and organizations, a budget is an internal tool used by
management and is often not required for reporting by external parties. In
general, traditional budgeting starts with tracking expenses, eliminating
debt and, once the budget is balanced, building an emergency fund. But to
speed up the process, you could start by building a partial emergency fund.
This emergency fund acts as a buffer as the rest of the budget is put in
place, and should replace the use of credit cards for emergency situations.
The key is to build the fund at regular intervals, consistently devoting a
certain percentage of each paycheck toward it and, if possible, putting in
whatever you can spare on top. This will get you to think about your
spending, too.
B) The factors to consider fo the network server installation checklist for the
quality assurance are as follows:
2. Install the OS
Network configuration
OS Patches
4. Rack & Stack. Make sure to verify:
Adequate power/cooling
Network connectivity
B. Explain the different options involved in the configuration of automatic updates for Windows
Server 2016. Write your answer in 200-150 words.
Patch management is a complex process, and I can't cover all the variables
Step 3: Make a list of all the security controls you have in place--routers,
firewalls, IDSes, AV, etc.--as well as their configurations. Don't forget to include
system hardening or nonstandard configurations in your list of controls. This list
will help you decide how to respond to a vulnerability alert (if at all). For example,
let's say you learn that OpenSSH has a vulnerability that may allow a buffer-
overflow attack, but from your list of controls you know you don't allow the SecSH
protocol through your firewall. If nothing else, that knowledge gives you more time
to react.
Step 5: Classify the risk. Assess the vulnerability and likelihood of an attack
in your environment. Perhaps some of your servers are vulnerable, but none of
them is mission-critical. Perhaps your firewall already blocks the service exploited
by the vulnerability. In general, to classify and prioritize the risk, consider three
factors: the severity of the threat (the likelihood of it impacting your environment,
given its global distribution and your inventory/control list); the level of
vulnerability (e.g., is the affected system inside or outside perimeter firewalls?);
and the cost of mitigation and/or recovery.
Step 6: Apply the patch! OK, so now you have an updated inventory of
systems, a list of controls, a system for collecting and analysing vulnerability alerts
and a risk classification system. You've determined which patches you need to
install. Now comes the hard part: deploying them without disrupting uptime or
production. Fear not, there are several tools that can help you with the actual
patch process (see Resources, below). Evaluate these tools in terms of how well
they fit your environment and budget. In some cases, manual patch maintenance
may be more cost-effective. But in most cases--particularly for multiple servers or
server farms distributed across multiple locations--some type of automated patch
system will more than pay for itself.
B) Automatic updates are only for critical updates. They do not include security patches,
service patches, drivers, or other updates. It is recommended you set up your computer
to do critical updates automatically, even though they are also included in the standard
Windows Updates. You must perform all updates to secure your system. To set up
automatic critical updates:
Click Start > Control Panel > Security if using Windows Vista or higher
Assure that the option for automatic updates is turned on.
In addition to setting your computer to do critical updates automatically, you must also
check for and install security and service patch updates. It is recommended that you do
this procedure at least weekly.
MACINTOSH UPDATES
1. Open Software Update by clicking the System Preferences icon in the dock.
2. Select Software Update.
3. Click Update Now.
4. You will now connect to Apple's website and retrieve the latest updates. You will
see a list of updates. Check the items you wish to install and click Install.
5. If asked to accept a software license agreement, read the agreement and
click Accept.
6. Sometimes new components will ask you to restart your computer. If so, you will
see a Restart button. Save your work and close any open programs before
clicking Restart.
7. If the Software Update did not find any new components, you will be so informed
and you may exit
B
The list of the five netwok services are
Directory services
e-Mail
File sharing
Instant messaging
Online game
The hub.
The switch.
The bridge.
Transceivers.
Second attempt:
Student Declaration I declare that the answers I have provided are my own work.
Where I have accessed information from other sources, I have
provided references and or links to my sources.
I have kept a copy of all relevant notes and reference material
that I used as part of my submission.
I have provided references for all sources where the
information is not my own. I understand the consequences of
falsifying documentation and plagiarism. I understand how
the assessment is structured. I accept that all work I submit
must be verifiable as my own.
I understand that if I disagree with the assessment outcome, I
can appeal the assessment process, and either re-submit
additional evidence undertake gap training and or have my
submission re-assessed.
All appeal options have been explained to me.
Student Signature
Date
Trainer/Assessor Name Gitam lama
Trainer/Assessor I hold:
Declaration Vocational competencies at least to the level being delivered
Current relevant industry skills
Current knowledge and skills in VET, and undertake
Ongoing professional development in VET
I declare that I have conducted an assessment of this candidate’s
submission. The assessment tasks were deemed current, sufficient,
valid and reliable. I declare that I have conducted a fair, valid, reliable,
and flexible assessment. I have provided feedback to the above-
named candidate.
Trainer/Assessor
Signature
Date
Office Use Only Outcome of Assessment has been entered onto the Student
Management System on _________________ (insert date)
by (insert Name) __________________________________
Applicable conditions:
This project is untimed and are conducted as open book tests (this means you are able to
refer to your textbook).
You must read and respond to all criteria of the project.
You may handwrite/use computers to answer the criteria of the project.
You must complete the task independently.
No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
As you complete this assessment task you are predominately demonstrating your practical
skills, techniques and knowledge to your trainer/assessor.
The trainer/assessor may ask you relevant questions on this assessment task to ensure that
this is your own work.
Location:
This assessment task may be completed in an independent learning environment or learning
management system.
Your trainer/assessor will provide you further information regarding the location of
completing this assessment task.
This assessment task is designed to evaluate your following skills and abilities to implement
integrated server solution.
For this purpose an online academics management system has already been approved and is set to
be implemented across the institute. The system is known as the MOODLE and will make the
students to do their assessments online on the premises of the institute. This system will also help
the trainers to check and assess these assessments online. Also, an in house developed Student
Information Management System is to be implemented to record the personal information and
documents of the students along with their accounts/fees management.
For, this IT department lead by Neil, IT Manager will supervise the implementation of the network
server so that these systems can be implemented and can be used on the network of the institute.
While Rob, the System Administrator will be responsible for setup of a network server for the
implementation of the MOODLE and Student Information Management System on it.
The network server will be online and can be accessed from anywhere in the college using the
network connected computers. Also, the network is comprised of computers, scanners, printers and
a WiFI access point enabling the laptops and hand held devices to be connected with the network
and can access the network server. Note, the network server can only be access within the LAN of
the institute that means it cannot be access remotely or using the internet.
Analyse business needs presented by users and recommend technical solutions with
completion timeline
Maintain organisation’s effectiveness and efficiency by defining, delivering, and supporting
strategic plans
Direct research in emerging technology by studying organisation goals, strategies, practices,
and user projects
Produce detailed timelines and implement effective project control for each software release
Verify application results by conducting system audits of technologies implemented
Preserve assets by implementing disaster recovery, backup procedures, information security
and control structures
Recommend information technology strategies, policies, and procedures by evaluating
organisation outcomes, identifying problems, and anticipating organisational requirements
Accomplish financial objectives by forecasting requirements, preparing an annual budget,
scheduling expenditures, analyzing variances, and initiating corrective action
Install hardware and peripheral components
Load appropriate software packages such as operating systems
Administer email and anti-virus systems
Troubleshoot and resolve user issues relative to all corporate software in a timely manner
Participate in all hardware and software evaluations and maintains vendor contracts
Job Description of System Administrator:
Task 1: (Role Play on preparation of designing of network server as per the business requirements)
The IT department has decided to arrange a meeting and discuss with the other stakeholders about
the planning, designing and implementation of the network server. The IT department also needs to
consult with the stakeholders about the benefits of the implementation of the network server and
then acquire the approval from the competent authority.
In this role play the stakeholders include the General Manager, Finance Manager, IT Manager, System
Administrator and the Operations Manager which will act as the client. The IT administrator will
elaborate and discuss the planning and designing of the network server. While the finance Manager
will be responsible for consideration of the budget issues. The Assessor will act as the IT Manager
and will supervise all the discussion of the System Administrator with the stakeholders. While three
students will act the Finance Manager, General Manager and the Operations Manager.
In the role play, the Student will act as the System Administrator and will need to discuss the
following and also he is responsible for the recording of the minutes of meetings and get these
signed from the authorised personals, the template of the minutes of meetings is given below:
Discuss with the stakeholders about the requirements of the network server. You need to
elaborate the requirements for the network server for the organisation.
Discuss with the Finance Manager, about the business problems, opportunities, scope and
budget of the implementation. The Finance Manager will arise the financial constraints but
you need to explain the benefits of paperless environment as per the scenario.
Discuss and identify the hazards and risks associated and discuss these with the IT Manager
and Operations Manager.
Discuss the site clean-up and restoration for the server room.
You are required to complete the following meeting minute’s template and submit to your
trainer/assessor.
Meeting Objective: To prepare and design network server as per the business requirements
Attendees: 4
Date: 2018/09/17
Task 2: Report - (Documentation of the plan and design of the Network Server)
Once the discussion and the approval of the project has been acquired, you need to prepare a report
on the design and the planning of the implementation of the Network Server. Also, once the report is
completed you need it be signed from the IT Manager for the approval of the designing phase and
initiation of the implementation. The report will include the following points and also complete the
template given below:
Checklist for the installation of the server for the quality assurance process
Test plan as per the requirement of the organisation along with the performance standards
and quality expectations
Department: IT department
Upgradeable
from
Upgradeable Windows
from Windows Server
Server Role Server 2012 R2? 2012? Migration Supported?
Active No No Yes
Directory
Federation
Services
Upgradeable
from
Upgradeable Windows
from Windows Server
Server Role Server 2012 R2? 2012? Migration Supported?
Upgradeable
from
Upgradeable Windows
from Windows Server
Server Role Server 2012 R2? 2012? Migration Supported?
different cluster.
Upgradeable
from
Upgradeable Windows
from Windows Server
Server Role Server 2012 R2? 2012? Migration Supported?
Specifications of the network server (Windows Server 2016) and Installation Checklist
RAM: 512 MB
Disk Space: 32 GB
Optical Storage: DVD drive (if installing the OS from DVD media)
Turn into a Windows Server 2012 R2 foundation in a venture domain. Gain learning and abilities to
outline a venture arrangement that backings manual and mechanized server establishments in a
physical and virtual condition. Get the total information on supporting document and capacity
administrations. Obtain aptitudes important to give endeavor organizing arrangements, for
example, DHCP, IPAM, VPN, and DirectAccess. Have the capacity to outline and execute a
backwoods and space framework including multi areas/timberland and branch office situations.
Plan, outline and convey a physical and coherent Windows Server® 2012 R2 endeavor framework
Simply Enough Administration in Windows Server 2016 is security innovation that empowers
designated organization for anything that can be made do with Windows PowerShell. Abilities
incorporate help for running under a system personality, interfacing over PowerShell Direct, safely
duplicating records to or from JEA endpoints, and designing the PowerShell support to dispatch in
a JEA setting as a matter of course. For more subtle elements, see JEA on GitHub.
Accreditation Guard
Accreditation Guard utilizes virtualization-based security to disengage mysteries with the goal that
just advantaged framework programming can get to them. See Protect inferred area qualifications
with Credential Guard.
Certification Guard incorporates bolster for RDP sessions with the goal that the client
accreditations stay on the customer side and are not uncovered on the server side. This
additionally gives Single Sign On to Remote Desktop. See Protect inferred space qualifications with
Windows Defender Credential Guard.
Gadget Guard gives piece mode code uprightness (KMCI) and client mode code respectability
(UMCI) by making strategies that indicate what code can keep running on the server. See
Introduction to Windows Defender Device Guard: virtualization-based security and code honesty
strategies.
Windows Defender
Windows Defender Overview for Windows Server 2016. Windows Server Antimalware is
introduced and empowered of course in Windows Server 2016, however the UI for Windows
Server Antimalware isn't introduced. Notwithstanding, Windows Server Antimalware will refresh
antimalware definitions and ensure the PC without the UI. On the off chance that you require the
UI for Windows Server Antimalware, you can introduce it after the working framework
establishment by utilizing the Add Roles and Features Wizard.
Prototype design
Prototype design is a stage security highlight that was made to battle memory debasement
vulnerabilities. See Control Flow Guard for more data.
Model plan: A model is a unique model, frame or an occurrence that fills in as a reason for
different procedures. In programming innovation, the term model is a working precedent through
which another model or another adaptation of a current item can be determined.
https://docs.microsoft.com/en-us/windows-server/get-started/whats-new-in-windows-server-
2016
3. Go to the Test Plans tab of the Test hub. Create a test plan for your current sprint.
4. Name the test plan. Check the area path and iteration. Then choose Create.
1. Now add test suites for the backlog items that need manual tests. (These backlog items
could be user stories, requirements, or other work items based on the setup of your
project.)
You use requirement-based suites to group your test cases together. That way, you can track the
testing status of a backlog item. Each test case that you add to a requirement-based test suite is
automatically linked to the backlog item.
2. Add a clause to filter by the iteration path for the sprint. Run the query to view the
matching backlog items.
3. Select the backlog items that you want to test this sprint. Add them as requirements to
your test plan by creating test suites from them.
Now you've created a requirement-based test suite for each backlog item.
A procedure sets out the steps to be followed for work activities. You must consult with affected
workers when developing procedures for:
Procedures should be in writing to provide clarity and certainty at the workplace and demonstrate
compliance. They should clearly set out the role of health and safety representatives, and any
other parties involved in the activity. The procedures should be easily accessible, for example by
placing them on noticeboards and intranet sites.
In the context of issue resolution where procedures are agreed to, the Work, Health and Safety
Regulations 2011 include minimum requirements including that these procedures are set out in
writing and communicated to all workers to whom the procedure applies.
Many workplaces are required by law to have health and safety committees, which help develop
standards, rules and procedures for health and safety that are to be followed or complied with at
the workplace. According to the Work Health and Safety Regulations 2011, when it comes to risk
management, a procedure is a form of ‘administrative control’ that means a method of work, a
process or a procedure designed to minimise risk.
The Work Health and Safety Act (2011) states that while at work, a worker must co-operate with
any reasonable policy or procedure of the person conducting the business or undertaking (PCBU)
relating to health or safety at the workplace that has been notified to workers.
To create and implement a backup and recovery plan. You’ll need to figure out what data needs to
be backed up, how often the data should be backed up, and more. To help you create a plan,
consider the following questions:
The importance of data can go a long way toward helping you determine if you need to back it up
—as well as when and how it should be backed up. For critical data, such as a database, you’ll
want to have redundant backup sets that extend back for several backup periods. For sensitive
data, you’ll want to ensure that backup data is physically secure or encrypted. For less important
data, such as daily user files, you won’t need such an elaborate backup plan, but you’ll need to
back up the data regularly and ensure that the data can be recovered easily.
Data that doesn’t seem important to you might be very important to someone else. Thus, the type
of information the data contains can help you determine if you need to back up the data—as well
as when and how the data should be backed up.
The frequency of change can affect your decision on how often the data should be backed up. For
example, data that changes daily should be backed up daily.
Shadow copies are point-in-time copies of documents in shared folders. These point-in-time copies
make recovering documents easy, because you can quickly go back to an older version in case a
document is deleted or overwritten accidentally. You should use shadow copies in addition to
standard backup—not to replace backup procedures.
Time is an important factor in creating a backup plan. For critical systems, you might need to get
back online swiftly. To do this, you might need to alter your backup plan.
Ideally, someone should be a primary contact for the organization’s backup and recovery plan. This
person might also be responsible for performing the actual backup and recovery of data.
Scheduling backups when system use is as low as possible will speed the backup process. However,
you can’t always schedule backups for off-peak hours. So you need to carefully plan when key
system data is backed up.
Storing copies of backup tapes off-site is essential to recovering your systems in the case of a
natural disaster. In your offsite storage location, you should also include copies of the software you
might need to install to reestablish operational systems.
1. Implementation SummarySummary
Start Date 09/17/2018 Finish Date 09/20/2018
5. Document Signatures
Name Description Signature Date
Implementation Owner By signing this document, I 09/20/2018
Name acknowledge that I have received
all the stated deliverables at the
agreed to quality levels.
Ensured everyone’s
participation in the role play
Second attempt:
Student Declaration I declare that the answers I have provided are my own work.
Where I have accessed information from other sources, I have
provided references and or links to my sources.
I have kept a copy of all relevant notes and reference material
that I used as part of my submission.
I have provided references for all sources where the
information is not my own. I understand the consequences of
falsifying documentation and plagiarism. I understand how
the assessment is structured. I accept that all work I submit
must be verifiable as my own.
I understand that if I disagree with the assessment outcome, I
can appeal the assessment process, and either re-submit
additional evidence undertake gap training and or have my
submission re-assessed.
All appeal options have been explained to me.
Student Signature
Date 09/19/2018
Trainer/Assessor Name Gitam Lama
Trainer/Assessor I hold:
Declaration Vocational competencies at least to the level being delivered
Applicable conditions:
This project is timed except activity 2.
You must read and respond to all criteria of the project.
You may handwrite/use computers to answer the criteria of the project.
You must complete the task independently.
No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
As you complete this assessment task you are predominately demonstrating your practical
skills, techniques and knowledge to your trainer/assessor.
The trainer/assessor may ask you relevant questions on this assessment task to ensure that
this is your own work.
Location:
This assessment task may be completed in a simulated learning environment.
Your trainer/assessor will provide you further information regarding the location of
completing this assessment task.
This assessment task is designed to evaluate your following skills and abilities:
Ability implement encryption systems and inform users of any impacts
Skill to monitor and document encryption issues and compromises, and notify appropriate
person.
After the planning and documentation now the System Administrator/The student is required to
install the configure the server as per the requirements being defined in the scenario and in the
earlier tasks.
Note: For This activity RTO/Assessor will provide you the following:
You need to implement the network server solution as per the given points:
Install the Network operating system as per the specifications and installation checklist
(install Windows Server 2016)
Install Antivirus and troubleshooting tools as additional tools and third party software
applications
Patch and set the automatic updates for the Server Operating system to ensure security and
reliability.
Implement the backup and restoration in case to avoid data damage during event of a
disaster
For Assessor/trainer
Appendix 1
Configuring DHCP, DNS, web and proxy mail, FTP and Firewall
Appendix 2
Appendix 3
Appendix 4
Appendix 5
Configuring Firewall
Steps
Step2:
Steps 3:
Step5:
Step 7:
Step8:
Step 9:
Step 10:
Appendix 6
Patch and set the automatic updates for the Server Operating system to ensure security and
reliability.
Steps
Appendix 7
Implement the backup and restoration in case to avoid data damage during event of a
disaster
After the Backup schedule wizard we perform Backup once wizard to select our data to be
backup
After we select the backup data and recover the same data which has been deleted by
accidentially.
Continuation to the previous tasks, you need to test and troubleshoot the network server. The
trainer/assessor will act as the IT Manager and will supervise all the testing procedures. And also the
RTO/assessor will provide you the following for the testing purpose:
You need to test and troubleshoot the network servers as per the following:
Test the network server as per the requirements and plan defined initially.
Analyse the error reports and make changes
Troubleshoot the network server using the network troubleshooting tools and techniques
Test again as per the changes made and validate the changes as per the design and
implementation documentation
Template for TESTING NETWORK SERVER
TASK 2:
Once the testing of the integrated server solution is done, you need to prepare a report on the
following in terms of the documentation of the network design and the installation. The report must
include the following:
o Configuration changes
o Operational Changes
Also complete this report including the server status and at the end you need to complete
the sign off the implementation process initiation from the General Manager and Chief
information Officer.
Background: To prepare the report on the basis of Network server, documentation of the
network design and the installation.
Configuration Changes:
May include a reliable way for knowing when, who, what, and how your device configurations
have changed. This will help you detect out-of-process and rogue changes, reconcile changes to
valid change requests, and ensure that actual changes were properly made. Look for solutions
which can detect config changes (in real-time if needed), permit configurable alerting options,
as well as show what changed in a config and who made the change. Also look for the ability to
create automated actions that self-correct and maintain a history of all changes and details.
You can verify whether or not the mapping is successful by one of the following methods:
1. Viewing the configuration spreadsheet from the Server Configuration tab. If the
mapping is not successful the problem information appears red for the particular server.
2. Viewing the Server Configuration Status from the Administration tab. If the mapping is
not successful, a message appears indicating that the server configuration is not valid, or the
server information is not complete. You are prompted to view the configuration spreadsheet to
determine where the problem occurs.
Operational changes to server:
May include the following:
Always know what devices are on your network, what devices are under management, and
what devices are under maintenance. Look for solutions that auto-discover devices, offer
5. Document Signatures
Name Description Signature Date
Implementation Owner By signing this document, I 09/20/2018
Name acknowledge that I have received
all the stated deliverables at the
agreed to quality levels.
For Assessor/trainer
Appendix 7
Appendix 8
Appendix 10
Perfomance monitoring
Second attempt:
Student Declaration I declare that the answers I have provided are my own work.
Where I have accessed information from other sources, I have
provided references and or links to my sources.
I have kept a copy of all relevant notes and reference material
that I used as part of my submission.
I have provided references for all sources where the
information is not my own. I understand the consequences of
falsifying documentation and plagiarism. I understand how
the assessment is structured. I accept that all work I submit
must be verifiable as my own.
I understand that if I disagree with the assessment outcome, I
can appeal the assessment process, and either re-submit
additional evidence undertake gap training and or have my
submission re-assessed.
All appeal options have been explained to me.
Student Signature
Date
Trainer/Assessor Name Gitam lama
Trainer/Assessor I hold: