ICTNWK540 Assessment 1 Guideline
docx
keyboard_arrow_up
School
Kaplan Business School *
*We aren’t endorsed by this school
Course
540
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
15
Uploaded by GeneralParrotPerson1101
Assessment Task 1 – Knowledge Questions
Please answer the following questions. A word limit of 150 words applies to each response, unless otherwise specified.
Question 1
Describe three key features of industry standard network operating systems.
Key features of network operating system related to the typical function of sever such as administration, system maintenance and resource management.
Key features of network operating system include
-
Security Features
-
Operating Features
-
Administrative interface features
You have to write down in more details
Question 2
Explain
why
compatibility
issues
can
arise
when
installing
a
new
server and how procedures can
be
used
to
resolve
these.
Explain why
compatibility
issues
can
arise
when
installing
a
new
server
Procedures or strategies can
be
used
to
resolve
these.
-
Use the operating system admin compatibility assistants
-
Troubleshooting using in-built admin tools
-
Running programs or application inside the virtual machine to test
-
Referring to installation documentation or online help documentation
-
You have to write down in more details
Question 3
List four tools often used in business analysis to identify and understand problems, needs or opportunities in a workplace.
Term
Explain the relevance of the term to network service configuration
a. Domain name system (DNS)
Explain in one paragraph b. Dynamic host configuration protocol (DHCP)
Explain in one paragraph
c.
File transfer protocol (FTP)
Explain in one paragraph
d. Mail
Explain in one paragraph
e. Network time protocol (NTP)
Explain in one paragraph
f.
Proxy
Explain in one paragraph
g.
Server messages block (SMB)
Explain in one paragraph
h. Web
Explain in one paragraph
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 4
Complete the following table by explaining the relevance of each term to network service management.
Term
Explain the relevance of the term to network service management
a. Start
This is the term used to start a server and its instructions depend on the type of server.
b. Stop
This is the term used to stop a server and its instructions depend on type of the server.
c. Restart
This is the term used to restart a server and its instructions depend on type of the server.
d. Start on boot
This is the term used to start on boot a server and its instructions depend on type of the server.
Question 5
I
d
e
n
t
i
f
y
a
n
d
d
e
s
c
r
i
be
t
h
r
ee
n
e
t
w
o
r
k
s
e
r
v
i
c
e
s
e
c
u
r
i
t
y
f
e
a
t
u
r
e
s
.
T
h
r
ee
n
e
t
w
o
r
k
s
e
r
v
i
c
e
s
e
c
u
r
i
t
y
f
e
a
t
u
r
e
s
Antivirus Software -
Access Control System-
Firewall / Server Firewall -
IDS/IPS -
Define each term in a one paragraph
Question 6
Explain the importance of server firewall configuration and describe key steps in this process.
Question 7
I
d
e
n
t
i
f
y
a
n
d
s
u
mm
a
r
i
s
e
t
h
r
ee
e
x
a
m
p
l
e
s
o
f
t
r
o
u
b
l
e
s
h
oo
t
i
n
g
t
oo
l
s
/
t
e
c
hn
i
q
u
e
s
t
h
a
t
c
a
n be
u
s
e
d
in relation to networks.
Ping
Tracert/ traceroute
Ipconfig
ifconfig
Need to explain one paragraph each technique
Question 8
Complete the following table to describe how each of the network diagnostic utilities can be used for trouble shooting.
Network diagnostic utility
How it can be used for troubleshooting
a. Event viewer
How
event viewer can
be
used
for
troubleshooting?
b. Network monitor
How
network monitor can
be
used
for troubleshooting?
c. Performance console
How
performance console can
be
used
for troubleshooting?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 9
Complete the following table in relation to installation media.
Installation media
Explain how the item is used to install an operating system
Explain a common problem that can occur with the installation media
a. USB
Explain
how
usb
is
used
to install
an
operating
system?
USB is corrupted and cannot install the OS
b. Boot disk
Explain
how
boot disk
is
used
to install
an
operating
system?
The boot disk also cannot start the operating system as
it is also corrupted.
c. Network and script (automated install)
Explain
how
network script
is used
to
install
an
operating system
Instructions are not completed or don’t understand the instructions
d. Deployment services
Explain
how
deployment service is
used
to
install
an
operating system
The operator is unable to deployment work
Question 10
Explain the boot process for a sever, how it can result in boot failures and how to resolve this.
Boot process for a sever
Booting a server entails powering on the server,
waiting for the BIOS to load,
initialisation of the drives load,
verify and run the operating system,
load system utilities and authenticate the user.
To resolve the issue, the best thing to do is to restart the computer and enter the keystrokes required to get into the BIOS set up program.
Question 11
Explain how an operating system rescue environment can resolve operating issues.
The purpose of an operating system rescue environment is to be able to automatically run in the event of a boot failure and to automatically repair the issue. Question 12
Explain how to use operating system help and support utilities for troubleshooting server issues.
There are a number of troubleshooting tools and techniques that can be used to diagnose and correct server problems. These will be dependent upon the type of server installed and make and model. As an example, Microsoft Server utilities include:
Event viewer
Network monitor
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 13
Outline two types of performance monitoring tools and tuning options that may be required in relation to server installation and describe how to use these.
Two types of performance tuning include;
identifying server CPU bottlenecks and
optimising server table data. Running a CPU test will identify the applications or processes that consume the most CPU power.
Shifting data from one table to another will free up space for the data tables to be more efficient. Question 14
Describe two high availability options for servers and that can be used to resolve common
operating issues.
Ultra- high-performance server
Load balanced dedicated server
Clustering Server
Question 15
Explain the process of printer management relevant to the installation and management of a server.
A server can be configured to share and manage the use of print services on a network. It can manage print queues, spooling and provide or limit use by identifying the device and giving users access privileges.
Question 16
Explain the process for user authentication.
There are a number of factors used to authenticate a user that can be employed individually or
collectively, the latter is knows as MFA Multi Factor Authentication. The user needs to be identified first and then authorised second. The identification can be a name or email or employee number and the authorisation is granted via a password, biometrics like thumb print or retina scan.
Question 17
Explain the purpose of network directory services and an outline of the process for network services directory configuration.
The purpose of network directory services is to provide a map and a naming protocol that enables the devices and users on the network to connect. The two most common network directories are LDAP and Active Directory. Configuring these services requires the administrator to identify the device or service by its server address, specify the server port, enter the domain name of the server, create or authorise the username and the password. Question 18
Explain best practice for implementing backup and recovery procedures
The 3,2,1 rule for backup is a great file backup strategy.
The 3-2-1 rule is a widely recommended backup strategy that provides a strong level of data
protection. It emphasizes redundancy and off-site storage to safeguard against various
threats. The rule is as follows:
1.
Have at least three copies of your data: This means creating and maintaining three
separate copies of your important files or data. The original data plus two additional
copies. By having multiple copies, you increase the chances of data recovery in case
of data loss.
2.
Store the copies on two different types of media: Use different storage media for your
backup copies. For example, you can have one copy on your computer's internal hard
drive, another on an external hard drive or network-attached storage (NAS), and the
third on cloud storage. This protects against failures or damage to a single type of
media.
3.
Keep one copy off-site: Ensure that at least one backup copy is stored off-site,
preferably in a different physical location. This protects against events like theft, fire,
flood, or other disasters that could affect your primary location. Off-site backups can
be stored in cloud storage, at a remote data center, or in a different physical location
within your organization.
The 3-2-1 rule provides a robust backup strategy that combines redundancy, media diversity,
and geographic separation. It helps guard against various risks such as hardware failures,
accidental deletions, malware attacks, and site-level disasters. Following this rule significantly
increases the chances of recovering your data in case of an unfortunate event.
However, it's important to regularly test and validate your backups, ensure proper security
measures are in place, and consider the specific needs and compliance requirements of your
organization when implementing a backup strategy.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |
P.31 1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v
2.0
Question 19
Explain the process for error and event logging and reporting during a server installation.
Once the server is installed the next step is to run a series of tests to verify the performance to
ensure requirements are being met. SQL, Apache, Microsoft all have a dashboard or separate app that contain a suite of tests that can be run to detect various operational and interface problems. Any issues that are flagged should be resolved or identified by a check mark to signify they pass or the measurement within a given range that they comply with. After running the tests a report that should be printed and stored with the other installation documentation
During a server installation, error and event logging and reporting are crucial aspects to monitor the
system's health, detect issues, and ensure proper functionality.
Question 20
E
x
p
l
a
i
n t
h
e
p
u
r
p
o
s
e
o
f
R
A
I
D
.
W
r
i
t
e
a
s
u
mm
a
r
y
o
f
t
h
e
p
r
o
c
e
ss
f
o
r
s
e
tt
i
n
g
u
p
R
A
I
D
.
The purpose of RAID is to join a number of disks together in an array, so that if one drive fails it can be replaced and data is not lost. The process for setting up a RAID array will differ depending on the operating system however
it should follow the basic steps of
Installing a RAID controller or management tool
Connecting the drives to be paired
Initialising the drives
Creating the array or Pairing the drives
Restart the computer to acknowledge the new array.
RAID, which stands for Redundant Array of Independent Disks, is a technology that combines multiple physical hard drives into a single logical unit. The purpose of RAID is to enhance data storage reliability, improve performance, and provide fault tolerance in case of disk failures. By using RAID, organizations and individuals can protect their data from loss and ensure high availability of stored information. RAID accomplishes these objectives through various techniques, including data striping, mirroring, and parity.
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J |
P.31 1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v
2.0
Question 21
Describe the benefit of using task scheduling utilities and give one example.
Scheduling a task is an efficient way to automate regular tasks such as a system back up that takes place overnight when an office is empty. Automating a task avoids the human error of forgetting to do it. Task scheduling utilities are software tools that allow you to automate and schedule the execution of tasks or processes on a computer system. These utilities offer several benefits, including increased productivity, improved efficiency, and better resource utilization.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help