ICTNWK540 Assessment 1 Guideline

docx

School

Kaplan Business School *

*We aren’t endorsed by this school

Course

540

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

15

Uploaded by GeneralParrotPerson1101

Report
Assessment Task 1 – Knowledge Questions Please answer the following questions. A word limit of 150 words applies to each response, unless otherwise specified. Question 1 Describe three key features of industry standard network operating systems. Key features of network operating system related to the typical function of sever such as administration, system maintenance and resource management. Key features of network operating system include - Security Features - Operating Features - Administrative interface features You have to write down in more details Question 2 Explain why compatibility issues can arise when installing a new server and how procedures can be used to resolve these. Explain why compatibility issues can arise when installing a new server Procedures or strategies can be used to resolve these. - Use the operating system admin compatibility assistants - Troubleshooting using in-built admin tools - Running programs or application inside the virtual machine to test - Referring to installation documentation or online help documentation - You have to write down in more details
Question 3 List four tools often used in business analysis to identify and understand problems, needs or opportunities in a workplace. Term Explain the relevance of the term to network service configuration a. Domain name system (DNS) Explain in one paragraph b. Dynamic host configuration protocol (DHCP) Explain in one paragraph c. File transfer protocol (FTP) Explain in one paragraph d. Mail Explain in one paragraph e. Network time protocol (NTP) Explain in one paragraph f. Proxy Explain in one paragraph g. Server messages block (SMB) Explain in one paragraph h. Web Explain in one paragraph
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 4 Complete the following table by explaining the relevance of each term to network service management. Term Explain the relevance of the term to network service management a. Start This is the term used to start a server and its instructions depend on the type of server. b. Stop This is the term used to stop a server and its instructions depend on type of the server. c. Restart This is the term used to restart a server and its instructions depend on type of the server. d. Start on boot This is the term used to start on boot a server and its instructions depend on type of the server.
Question 5 I d e n t i f y a n d d e s c r i be t h r ee n e t w o r k s e r v i c e s e c u r i t y f e a t u r e s . T h r ee n e t w o r k s e r v i c e s e c u r i t y f e a t u r e s Antivirus Software - Access Control System- Firewall / Server Firewall - IDS/IPS - Define each term in a one paragraph Question 6 Explain the importance of server firewall configuration and describe key steps in this process.
Question 7 I d e n t i f y a n d s u mm a r i s e t h r ee e x a m p l e s o f t r o u b l e s h oo t i n g t oo l s / t e c hn i q u e s t h a t c a n be u s e d in relation to networks. Ping Tracert/ traceroute Ipconfig ifconfig Need to explain one paragraph each technique Question 8 Complete the following table to describe how each of the network diagnostic utilities can be used for trouble shooting. Network diagnostic utility How it can be used for troubleshooting a. Event viewer How event viewer can be used for troubleshooting? b. Network monitor How network monitor can be used for troubleshooting? c. Performance console How performance console can be used for troubleshooting?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 9 Complete the following table in relation to installation media. Installation media Explain how the item is used to install an operating system Explain a common problem that can occur with the installation media a. USB Explain how usb is used to install an operating system? USB is corrupted and cannot install the OS b. Boot disk Explain how boot disk is used to install an operating system? The boot disk also cannot start the operating system as it is also corrupted. c. Network and script (automated install) Explain how network script is used to install an operating system Instructions are not completed or don’t understand the instructions d. Deployment services Explain how deployment service is used to install an operating system The operator is unable to deployment work
Question 10 Explain the boot process for a sever, how it can result in boot failures and how to resolve this. Boot process for a sever Booting a server entails powering on the server, waiting for the BIOS to load, initialisation of the drives load, verify and run the operating system, load system utilities and authenticate the user. To resolve the issue, the best thing to do is to restart the computer and enter the keystrokes required to get into the BIOS set up program.
Question 11 Explain how an operating system rescue environment can resolve operating issues. The purpose of an operating system rescue environment is to be able to automatically run in the event of a boot failure and to automatically repair the issue. Question 12 Explain how to use operating system help and support utilities for troubleshooting server issues. There are a number of troubleshooting tools and techniques that can be used to diagnose and correct server problems. These will be dependent upon the type of server installed and make and model. As an example, Microsoft Server utilities include: Event viewer Network monitor
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 13 Outline two types of performance monitoring tools and tuning options that may be required in relation to server installation and describe how to use these. Two types of performance tuning include; identifying server CPU bottlenecks and optimising server table data. Running a CPU test will identify the applications or processes that consume the most CPU power. Shifting data from one table to another will free up space for the data tables to be more efficient. Question 14 Describe two high availability options for servers and that can be used to resolve common operating issues. Ultra- high-performance server Load balanced dedicated server Clustering Server Question 15 Explain the process of printer management relevant to the installation and management of a server. A server can be configured to share and manage the use of print services on a network. It can manage print queues, spooling and provide or limit use by identifying the device and giving users access privileges.
Question 16 Explain the process for user authentication. There are a number of factors used to authenticate a user that can be employed individually or collectively, the latter is knows as MFA Multi Factor Authentication. The user needs to be identified first and then authorised second. The identification can be a name or email or employee number and the authorisation is granted via a password, biometrics like thumb print or retina scan.
Question 17 Explain the purpose of network directory services and an outline of the process for network services directory configuration. The purpose of network directory services is to provide a map and a naming protocol that enables the devices and users on the network to connect. The two most common network directories are LDAP and Active Directory. Configuring these services requires the administrator to identify the device or service by its server address, specify the server port, enter the domain name of the server, create or authorise the username and the password. Question 18 Explain best practice for implementing backup and recovery procedures The 3,2,1 rule for backup is a great file backup strategy. The 3-2-1 rule is a widely recommended backup strategy that provides a strong level of data protection. It emphasizes redundancy and off-site storage to safeguard against various threats. The rule is as follows: 1. Have at least three copies of your data: This means creating and maintaining three separate copies of your important files or data. The original data plus two additional copies. By having multiple copies, you increase the chances of data recovery in case of data loss. 2. Store the copies on two different types of media: Use different storage media for your backup copies. For example, you can have one copy on your computer's internal hard drive, another on an external hard drive or network-attached storage (NAS), and the third on cloud storage. This protects against failures or damage to a single type of media. 3. Keep one copy off-site: Ensure that at least one backup copy is stored off-site, preferably in a different physical location. This protects against events like theft, fire, flood, or other disasters that could affect your primary location. Off-site backups can be stored in cloud storage, at a remote data center, or in a different physical location within your organization. The 3-2-1 rule provides a robust backup strategy that combines redundancy, media diversity, and geographic separation. It helps guard against various risks such as hardware failures, accidental deletions, malware attacks, and site-level disasters. Following this rule significantly increases the chances of recovering your data in case of an unfortunate event. However, it's important to regularly test and validate your backups, ensure proper security measures are in place, and consider the specific needs and compliance requirements of your organization when implementing a backup strategy.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J | P.31 1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0 Question 19 Explain the process for error and event logging and reporting during a server installation. Once the server is installed the next step is to run a series of tests to verify the performance to ensure requirements are being met. SQL, Apache, Microsoft all have a dashboard or separate app that contain a suite of tests that can be run to detect various operational and interface problems. Any issues that are flagged should be resolved or identified by a check mark to signify they pass or the measurement within a given range that they comply with. After running the tests a report that should be printed and stored with the other installation documentation During a server installation, error and event logging and reporting are crucial aspects to monitor the system's health, detect issues, and ensure proper functionality. Question 20 E x p l a i n t h e p u r p o s e o f R A I D . W r i t e a s u mm a r y o f t h e p r o c e ss f o r s e tt i n g u p R A I D . The purpose of RAID is to join a number of disks together in an array, so that if one drive fails it can be replaced and data is not lost. The process for setting up a RAID array will differ depending on the operating system however it should follow the basic steps of Installing a RAID controller or management tool Connecting the drives to be paired Initialising the drives Creating the array or Pairing the drives Restart the computer to acknowledge the new array. RAID, which stands for Redundant Array of Independent Disks, is a technology that combines multiple physical hard drives into a single logical unit. The purpose of RAID is to enhance data storage reliability, improve performance, and provide fault tolerance in case of disk failures. By using RAID, organizations and individuals can protect their data from loss and ensure high availability of stored information. RAID accomplishes these objectives through various techniques, including data striping, mirroring, and parity.
ANIT Australia Pty Ltd t/a Albright Institute of Business and Language | RTO: 45041 | CRICOS: 03553J | P.31 1300 189 154 | Level 2, 341-345 Queen Street, Melbourne VIC 3000 | www.albrightinstitute.edu.au | v 2.0 Question 21 Describe the benefit of using task scheduling utilities and give one example. Scheduling a task is an efficient way to automate regular tasks such as a system back up that takes place overnight when an office is empty. Automating a task avoids the human error of forgetting to do it. Task scheduling utilities are software tools that allow you to automate and schedule the execution of tasks or processes on a computer system. These utilities offer several benefits, including increased productivity, improved efficiency, and better resource utilization.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help