1 - ICTNWK540 Student Assessment Guide

docx

School

Deakin University *

*We aren’t endorsed by this school

Course

611

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

55

Uploaded by BrigadierAnteaterMaster276

Report
Student Assessment Guide: ICTNWK540 Design, build and test network servers
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Copyright 2023 All rights reserved Version: 23.0 Date Modified: April 2023 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission. Disclaimer: The XYZ does not invite reliance upon, nor accept responsibility for, the information it provides. XYZ makes every effort to provide a high-quality service. However, neither the XYZ, nor the providers of data, gives any guarantees, undertakings or warranties concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information from another source if it is of sufficient importance for them to do so. Content Student Assessment Guide: ICTNWK540 Version: v23.0 Page 2 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers s 1. Assessment Information ...................................................................................................... 4 A. Purpose of the assessment .............................................................................................................. 4 B. What you are required to do ........................................................................................................... 4 C. Competencies being assessed ......................................................................................................... 4 D. Important resources for completing this assessment ........................... Error! Bookmark not defined. E. A note on plagiarism and referencing .............................................................................................. 6 F. A note on questions with role plays ...................................................... Error! Bookmark not defined. G. Instructions for completing this assessment .................................................................................... 7 2. Assessment Coversheet ....................................................................................................... 7 3. Assessment Questions ......................................................................................................... 8 A. Task A - Plan and design network servers to meet business requirements ......................................... 8 B. Task B – Prepare for network server installation ............................................................................... 11 C. Task C – Build and configure the servers according to design ........................................................... 13 D. Task D – Test and reconfigure network servers ................................................................................. 20 E. Task E – Complete and document network design and installation .................................................. 21 4. Student Self Checklist ........................................................................................................ 29 Student Assessment Guide: ICTNWK540 Version: v23.0 Page 3 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers 1. Assessment Information A. Purpose of the assessment This unit describes the skills and knowledge required to design, install and test a server in a complex network environment. It applies to individuals who are employed in network or systems engineering roles, such as network engineers who are required to design and build network servers in a complex computing environment of medium-to-large organizations. B. What you are required to do For this assessment, you are required to complete A tasks: 1. Task A - Plan and design network servers to meet business requirements 2. Task B – Prepare for network server installation 3. Task C – Build and configure the servers according to design 4. Task D – Test and reconfigure network servers 5. Task E – Complete and document network design and installation C. Competencies being assessed Elements To achieve competency in this unit you must demonstrate your ability to: 1. Plan and design network servers. 2. Configure and design network servers. 3. Test design performance 4. Document network design Student Assessment Guide: ICTNWK540 Version: v23.0 Page 4 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Performance Evidence Evidence of the ability to: Produce a design report for a server with complex user and network service requirements. Install and configure the server according to the produced design. Monitor and test the server. Troubleshoot server and network failures. Configure a wide range of server network and security services, including: o Domain name system (DNS). o Dynamic host configuration protocol (DHCP). o Web and proxy mail. o File Transfer protocol (FTP). o Firewall. Knowledge Evidence You must demonstrate knowledge of: Describe key features of current network operating system and server application’s compatibility issues. Discuss network service configuration. Identify and describe network service security features, including server firewall configuration Identify and summaries troubleshooting tools and techniques, including network diagnostic utilities Describe common operating system installation and operation issues. Installation media/ Describe data security and storage measures required on a networked server. Describe the process of managing a project. E. A note on plagiarism and referencing Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as your own. When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you are quoting a source, make sure to acknowledge this by including “quotation marks” around the relevant words/sentences or ideas. Note the source at the point at which it is included within your Student Assessment Guide: ICTNWK540 Version: v23.0 Page 5 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at the end of your assessment. All sources used for your assessment should be detailed in a ‘references’ section. It is advisable to never copy another person’s work. G. Instructions for completing this assessment Answer the questions below using the spaces provided: Answer all parts of each question Use your own words and give examples wherever possible The quality of your answer is more important than how long it is Enter your answers in this document You may use various sources of information to inform your answers, including your resources provided by ACBI, books, and online sources. You must acknowledge and cite your sources. 2. Assessment Coversheet Student Assessment Guide: ICTNWK540 Version: v23.0 Page 6 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers 3. Assessment Questions A. Task A – Plan and design network servers to meet business requirements Task A instructions Answer the questions below to demonstrate your knowledge of network servers to meet business Student Assessment Guide: ICTNWK540 Version: v23.0 Page 7 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers requirements. A1. Answer the following questions: A. Explain the features required for Network Operating System (NOS). Write your answer in 100-150 words. B. What are the two (2) latest server applications compatibility issues and their resolution procedures? Write your answer in 100-150 words. Write your answer here A. a)A network operating system has the capacity to manage multiple tasks at once. Each service can be run independently, indicating that if one fails, it won't have an impact on the others and the remaining services will continue to run without any lag. b) A better performance and hot plug support—The network operating system supports hardware devices with a larger capacity. Additionally, it promotes the hot plug aspect. The capability enables software updates without shutting the system down. c) Stability and numerous users - Network operating systems are more stable since they can function for a longer period of time without crashing. This has been connected to the network system's ability to restart without resetting the systems. B. A lot of factors can cause compatibility problems when installing new servers. For instance, compatibility issues might occur when people are using the same sort of software for a task, such as a word processor, yet they are unable to communicate with one another.This can be due to variations in their versions. Additionally, the difficulties resulting in compatibility concerns may be caused by the varied manufacturing processes used by the various firms. To fix the problem, enter the program's name in the search box, then click the program's selection to bring up the context menu. A3. Summarize the following network service configurations: A. Domain name system (DNS) B. Dynamic host configuration protocol (DHCP) C. File transfer protocol (FTP) Student Assessment Guide: ICTNWK540 Version: v23.0 Page 8 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers D. Mail E. Network time protocol (NTP) F. Proxy G. Server messages block (SMB) H. Web Write 50 to 100 words for each of the configuration. Write your answer here DNS It links different pieces of information and data to the domain names assigned to each of the involved components. Covert names to IP address. DHCP It gives each networked device an IP address and other configuration parameters to enable connectivity with other networks. FTP improves the transfer of computer files from servers to clients over a network Mail receives emails from clients or customers and sends them via the network to other mail servers. NTP Relevance for setting the time between the computer and the latent packed-switch and changeable data network Proxy This server programme serves as a mediator between clients and servers in network service management by offering resources. SMB This is the internet standard protocol that Windows uses to share files, access printers, and other serial ports in a network group to simplify their tasks or ours. We commonly see this set up in offices or internet cafes. Web Web is short for WORLD WIDE. The word "WEB" itself refers to a global network that makes it possible to view and distribute information both globally and online. A4. Explain the following network service management terms: A. Start B. Stop Student Assessment Guide: ICTNWK540 Version: v23.0 Page 9 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers C. Restart D. Start on boot Write your response in 150-200 words Write your answer here Start In network service management, the start represents that all nodes are operationally sound and functioning well. Stop When we use network service management, the STOP command simply signifies that our network service has ceased on all nodes and that data synchronisation is disabled. Restart good for troubleshooting running programme errors Start on Boot programmes that are essential or necessary to run immediately after booting up A4. Answer the following questions: A. What are the five (5) essential features of network service security? Write your answer in 150-200 words. B. What are the steps involved in configuring server firewall on Windows server 2012? Write your answer here A. Identity - It is essential to accurately and positively identify network users, hosts, applications, services, and resources. Identification is made possible through protocols like RADIUS and TACACS+, password tools, and Kerberos. You can restrict access to network applications, data, and services using perimeter security, allowing only authorised users and information to move through the network. Identify and explain three features that enhance network service security. Identity - It is essential to accurately and positively identify network users, hosts, applications, services, and resources. Identification is made possible through protocols like RADIUS and TACACS+, password tools, and Student Assessment Guide: ICTNWK540 Version: v23.0 Page 10 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Kerberos. You can restrict access to network applications, data, and services using perimeter security, allowing only authorised users and information to move through the network. B. The purpose of server firewalls is to regulate network traffic by setting up security rules for both incoming and outgoing traffic. The server firewalls are essential for daily computing since they block some unwelcome traffic. Server firewalls, which concentrate on preventing malware and application- layer attacks, are another important component of security. They will also stop harmful software on your PC. Identification of network users, hosts, applications, services, and resources must be precise and positive.You may manage access to network applications, data, and services with perimeter security so that only authorised people and information can move through the network. A5: Answer the following questions: A: What is the importance of consultation with the key stakeholders and how does it help to effectively coordinate the task? Write your response in 100-150 words. B: What is the importance of the Work Health and Safety (WHS) processes and procedures at a workplace? Write your response in 100-150 words. Write your answer here A. Try checking the cable if you experience a network issue. Its primary issue is that it connects two devices. It might become defective, shorter, or physically injured, but some people choose to ignore it. Following the connection, the source host will not be able to interact with the destination host because the port or interface on which the device is attached or constrained may be physically down or defective. And finally, tracover load. The capacity or traffic on a device exceeds its carrying capacity if the link is overused, and as a result of overload conditions, the gadget will begin acting erratically. In order to troubleshoot the network, apply those three methods. B. It goes without saying that workplace health and safety are crucial. If you prioritise profit over the health of your employees, you could get into a lot of problems. Even worse, if an accident happens at work, your business may be held liable. WHS encourages and tries to guarantee the avoidance of mishaps and other occurrences at the workplace. Employers and even employees may maximise their time and effort by doing this. In other words, WHS is crucial because it increases productivity and saves time. Additionally, an effective WHS programme helps the business avoid spending money on handling Student Assessment Guide: ICTNWK540 Version: v23.0 Page 11 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers accidents and paying compensation. A6. Answer the following questions. A. Explain network services in your own words. In 50-100 words. B. List any five network services and network connectivity devices. Write your answer here A. Network services are programmes at the network application layer that link people to programmes and data on a network from their desks, branches, or remote places. Usually, servers are used to host these services. B. Network Services Directory services. e-Mail. File sharing. Instant messaging. Online game. Printing. File server. Voice over IP. Network Devices Bridge Gateway Hub Modem Repeater Router Switch A7. Explain the following terms in 30-100 words for each: Student Assessment Guide: ICTNWK540 Version: v23.0 Page 12 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers A. Business problems B. Opportunities C. Scope D. Budget Write your answer here A. Business problems are challenges that organisations may face when they carry out their operations. Learning more about typical business issues can aid a company in creating strategies and responding to these challenges in an efficient manner. These kinds of issues frequently include particular aspects of a company, like: strategy. B. A business opportunity is the chance to benefit from a market development for financial gain. It is what distinguishes successful companies from unsuccessful ones. C. The term "scope" in the business world refers to the total set of goals and demands necessary to finish a project. Project managers frequently use the word "scope." D. An expenditure plan for your firm based on your income and expenses is called a business budget. It determines your available cash, calculates your expenses, and aids in income forecasting. B. Task B – Prepare for network server installation Task B instructions: Answer the questions below to demonstrate your knowledge of network installation. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 13 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers B1. Answer the following questions. A. What are the two (2) network troubleshooting tools and techniques? Write your response in 100-150 words. What are the five (5) network diagnostic utilities? Write 30-50 words for each. Write your answer here Try checking the cable if you experience a network issue. Its primary issue is that it connects two devices. It might become defective, shorter, or physically injured, but some people choose to ignore it. Following the connection, the source host will not be able to interact with the destination host because the port or interface on which the device is attached or constrained may be physically down or defective. And finally, tracoverload. The capacity or traffic on a device exceeds its carrying capacity if the link is overused, and as a result of overload conditions, the gadget will begin acting erratically. In order to troubleshoot the network, apply those three methods. B2. Answer the following questions. A. Briefly explain the importance of the following installation media in 30-50 words each. a. CD b. DVD c. universal serial bus (USB) d. boot disk e. network and script (automated install) f. deployment services B. Briefly explain boot process and diagnosing boot failures related to network server. Answer in 50-100 words. C. Briefly explain operating system rescue environment related to network server. Answer in 50-100 words. Write your answer here A. a. CD/DVD/Boot Disk You must configure your computer to start from the CD/DVD drive in order to install the operating system from a CD or DVD.2. You can alter the bootsequence in your BIOS settings and designate the CD/DVD drive as the first boot device.3. On some systems, you can access the boot sequence by pressing a specific key on the keyboard when the machine first starts up without entering the BIOS. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 14 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Network Script Create a setup script that responds to every installation programme enquiry using automated setup. Once you've built the script, you can start the automated installation and come back when it's finished.Automated setup is only practicable if you have a big number of servers to install because developing the setup script takes time.Without physically visiting the server computer, Remote Installation Services (RIS), a Microsoft feature, enables you to install Windows server versions from a remote network location. Since this requires a lot of setup work, it is only worthwhile if you have many servers to install OS systems on. Flash Drive Connect the USB flash disc to your technician's PC.2. You can access Disc Management by selecting it from the context menu when you right-click on Start.3. Format the partition as described below: Right-click the USB drive partition to format it. Select the FAT32 file system to boot either BIOS-based or UEFI-based computers.Set the partition that is active to:Simply right-click the USB drive partition and choose Mark Partition as Active to make it active.Step 2: Transfer the OS setup, for instance Windows, to the USB flash drive. B The operating system code is loaded into the computer's memory during the boot process. The programme that configures the computer is called the BIOS (basic input/output system). the hardware configuration is finished, and the operating system is loaded. This results in a completely functional operating system. The operation might be carried out directly from a disc, via a local area network, networked storage, or via a networked storage device.Using a disc is the most widely used technique. The SCSI adapter BIOS contains the instructions that specify which disc is the server's boot device, and the server BIOS searches for this BIOS.The master boot record (MBR) is located in the first sector of the first hard disc.A physically small but important part of the startup procedure on x64 and x86.a machine powered by an x86 CPU. A computer goes through a series of stages when it first turns on.Before reading the MBR, he then completes a series of self- tests. The MBR contains instructions. C Tools for troubleshooting and automating repairs are used to automate routine diagnostic and repair processes.Push-button reset enables quick repairs without compromising important data or customizations. You can restore your entire hard drive using this application, which is only available for Windows 10 desktop editions, Windows 8.1, and Windows 8 System image recovery. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 15 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers B3. Answer the following questions. A. Briefly explain the importance of operating system help and support utilities in network server environment. Answer in 50-100 words. B. Briefly explain two performance monitoring tools and tuning options related to Windows server 2012. Answer in 50- 100 words. C. Briefly explain two compatibility issues and resolution procedures related to Windows server 2012. D. List and explain three high availability options for servers. Answer in 50-100 words. Briefly explain file and print management in 50-100 words. Write your answer here A Event Viewer - BizTalk Server records information, warnings, and failures in the Event Log of the BizTalk Server-based machine. The Event logs should always be the first place you look for information to assist you identify the issue while troubleshooting a BizTalk Server component or dependency. Network Monitor use the Network Monitor software to gather network traffic between BizTalk Server and outside clients or servers. To determine what is wrong with the network, the collected network trace can then be examined. B PRTG - Paessler Both small and large organisations may utilise the network monitoring tool PRTG. PRTG is more than simply a server monitoring solution because it can keep an eye on every IT resource that connects to your network. The structure is flexible, allowing monitoring capabilities to change in accordance with your company's operational requirements. PRTG can keep an eye on all of your server's crucial components, such as CPU usage, hard disc performance, and RAM utilisation. Observium - A lot of SNMP-capable devices are supported by the network equipment and server monitoring programme Observium. Observium is incredibly easy to configure and set up. It is configured as a different server with a unique URL.You can begin adding hosts, networks, and SNMP data ranges to the graphical interface so that Observium can scan the surrounding networks and collect data for each identified system. Observium can also detect network devices using CDP, LLDP, or FDP. Depending on the device, data can be collected and shown for each identified port. C Compatibility problems can be minor, such as when a few functions in an older version of the same software don't function properly, but they can also be troublesome, such when a later version of the software won't open a document written in an earlier version. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 16 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Two issues- File not supported and Application not supported. Resolution – Change the compatibility settings of the file and install the supported KB or version of software D - Ultra High Performance Dedicated Servers High-performance servers are high-end, dedicated systems with higher computing power that are designed specifically to deliver optimal performance. They're a fantastic method for managing business workloads. - Load Balanced Dedicated Servers The practise of efficiently and automatically distributing incoming web traffic among a number of servers is known as load balancing. A load balancer is a piece of hardware or software that has the ability to distribute load. B4. Answer the following questions. A. Explain user authentication and directory services for the network server. Answer in 50-100 words. B. Explain the steps you will follow to implement backup and restore functions on the network server. Answer in 150-200 words. C. In your own words, explain error and event logging and reporting. Answer in 50-100 words. D. Briefly explain file systems and disk partitioning schemes in 50-100 words. Write your answer here A True identification and authentication. During the identifying process, the security system receives the user's identity. This identification is established using a user ID.The security system will search all of the recognised abstract objects for the particular one that the current user is utilising. This will be followed by the identification of the user. The user's assertions are not always indicative of their veracity. B In its simplest form, backup and recovery refer to the process of storing data in order to ensure that it can be recovered in the event of a system failure. The following practises are the best for implementing backup and recovery procedures: Student Assessment Guide: ICTNWK540 Version: v23.0 Page 17 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers - recording the occurrence of changes in written data. This is crucial when restoring data in the event of hardware failure. - Continually update the hardware and software. To help with tracking, the information based on the drive and system should be kept up to date. - Make sure that your recoveries are reliable and efficient. All backups should be kept under surveillance to prevent errors. - Keep spares of similar gear. The hardware spare should be kept in a secure location. C During a server installation, the procedure for error and event lagging and reporting; - Idenfying the mistake. As much information as you can regarding the problem that is causing the latency should be gathered. - Make a model of justification. At this point, theories are being developed based on the causes of the apparent inaccuracy and solutions are being found for the lagging problem. - Create a strategy to address the issue. A short solution to the issue could end up resolving the whole thing. - Modify preventative measures. Verify each and every step after the repair is complete to ensure that the issue doesn't recur. - Note the results. Once the issue has been identified, it's critical to monitor its occurrence and put the solution into action. D Different filesystems can be installed for various types of files thanks to partitioning. It is possible to avoid having a complete system partition and a useless system by separating user data from system data. Additionally, partitioning can simplify backup. B5. Explain the processes involved in managing the project including the following: A. Documentation skills required for networks B. Task management C. Task scheduling utilities. Write 100-150 words for each in your response. Write your answer here A task scheduler is a device that enables particular actions to be carried out automatically when a particular set of conditions is met. Using job scheduling tools is advantageous.-Boosts productivity. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 18 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers The task scheduler integrated with technology makes it possible to assign tasks to employees.-It promotes truthfulness. This is because managing monitoring services has been greatly simplified.-It makes good use of resources. Although it automatically generates duties, the output provided for feedback is manual. The price paid is the one for the purchase of a product.-It is significantly simpler to locate dues. The task manager makes it easy to do assigned work when permitted actions are taking place. B6. Answer the following questions: A. What are the different factors to consider while securing approval of an ICT project? Write your response in 50-100 words. B. What are the factors to consider while designing a client report? Write your response in 100- 150 words. Write your answer here A 1. Budget: Although it's not always the case, internal resources will normally be less expensive than external ones. Prior to choosing, make sure to compare prices. 2. Timeline: If you're on a tight schedule, an outside source might be better equipped to meet your deadlines than internal workers. 3. Skill set: Do you possess the internal knowledge and abilities required to finish the project? If not, a third party service might be a better choice. 5. Experience: Compared to internal workers, external providers frequently have greater ICT project experience. If you're seeking for recommendations and best practises, this may be helpful. B - Benchmark - Include some benchmarks to compare yourself to, whether you're creating these criteria for yourself or your client is doing it for you. In this manner, your client will be able to quickly assess how you are doing over the specified time frame. Additionally, they will respect the fact that you are trying your best to live up to the greatest standards but still being human enough to admit that you might not always be flawless. - KPI - KPI tracking is a crucial component of business management. KPIs act as a north star to direct the business in the direction of success. - Metrics - Metrics, which are trackable data points that may be used to determine how well or poorly you are performing, are linked to KPIs. So to speak, they are outcomes. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 19 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Across the many departments in your organisation, there are a wide range of metrics that you can be monitoring at any given time. You should choose the metrics you include in your client reports carefully when it comes to their inclusion. - Goals - Everyone should practise goal-setting, at both the individual and organisational levels, on both a personal and professional level, for both the short term and the long term, and so on. - Budget - Dollars and hours are the two key components to take into account when discussing budget in client reports. - Revenue - Data relating to revenue MUST be included in each of your client reports if you have any involvement in the financial affairs of your clients. - ROI Tracking B7. Answer the following questions: A. What is meant by prototype design? Write your answer in 50-100 words. B. What are the factors to consider for the network server installation checklist for the quality assurance? Write your response in 100-150 words. Write your answer here A A prototype is a straightforward experimental model of a suggested solution that may be used to rapidly and inexpensively test or validate ideas, design hypotheses, and other parts of its conceptualisation. This allows the designer or designers involved to make the necessary adjustments or potential changes in direction. B - Understanding network goals - Budget creating - Acquiring components - Training - Security - Scalability - IT maintenance - Automation Student Assessment Guide: ICTNWK540 Version: v23.0 Page 20 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers C.Task C – Build and configure the servers according to design Task C instructions: For Task C, you are to continue using the case study scenario. In this Task, you require: Produce design documents to integrate multiple sever operating systems for authentication, file sharing and security. Install and configure the integrated solution according to the produced design. Monitor and test the solution. Troubleshoot integration problems. C1. THE SCENARIO: XYZ is a nationally recognised training institution, specialising in providing international students with vocational education training in a supportive and caring environment. Due to the progressive success of the institute, it has been decided by the IT department and the Academics department to have the centralised system for the management of the students’ records, both the academic progress and the personal information. For this purpose, an online academics management system has already been approved and is set to be implemented across the institute. The system is known as the Moodle and will make the students to do their assessments online on the premises of the institute. This system will also help Student Assessment Guide: ICTNWK540 Version: v23.0 Page 21 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers the trainers to check and assess these assessments online. Also, an in house developed Student Information Management System is to be implemented to record the personal information and documents of the students along with their accounts/fees management. For, this IT department lead by Neil, IT Manager will supervise the implementation of the network server so that these systems can be implemented and can be used on the network of the institute. While Rob, the System Administrator will be responsible for the setup of a network server for the implementation of the Moodle and Student Information Management System on it. The network server will be online and can be accessed from anywhere in the college using the network connected computers. Also, the network is comprised of computers, scanners, printers and a Wi-Fi access point enabling the laptops and hand held devices to be connected with the network and can access the network server. Note, the network server can only be accessed within the LAN of the institute that means it cannot be accessed remotely or using the internet. Issues with the current system: Excessive use of paper No server management Data is not backed up properly Wi-Fi is not working most of the time Data loss issues VPN and securities issues The job descriptions of IT Manager and System Administrator are as below: Job Description of IT manager: Analyse business needs presented by users and recommend technical solutions with completion timeline Maintain organisation’s effectiveness and efficiency by defining, delivering, and supporting strategic plans Direct research in emerging technology by studying organisation goals, strategies, practices, and user projects Produce detailed timelines and implement effective project control for each software release Verify application results by conducting system audits of technologies implemented Preserve assets by implementing disaster recovery, backup procedures, information security and control structures Recommend information technology strategies, policies, and procedures by evaluating organisation outcomes, identifying problems, and anticipating organisational requirements Accomplish financial objectives by forecasting requirements, preparing an annual budget, scheduling expenditures, analyzing variances, and initiating corrective action Install hardware and peripheral components Load appropriate software packages such as operating systems Administer email and anti-virus systems Troubleshoot and resolve user issues relative to all corporate software in a timely manner Participate in all hardware and software evaluations and maintains vendor contracts Student Assessment Guide: ICTNWK540 Version: v23.0 Page 22 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Job Description of System Administrator: Providing 1st and 2nd level support to ICT setup. Solving our student's and staff’s IT issues in a manner that exceeds their expectations. New Ticket Triage. Creating and documenting tickets, problem descriptions and technical background to ensure that our team members have all the information required to determine the right solution for the issue. Completing assigned backup checks. Updating ticket status as they change. Updating client and internal documents to reflect changing environments and knowledge. Providing 1st and 2nd level support to our clients based on ticket priority. Solving our client's IT issues in a manner that exceeds their expectations. Taking accountability and ownership for our client's IT issues as allocated on the Response Team Board, New Ticket Triage. Creating and documenting tickets, problem descriptions and technical background to ensure that our team members have all the information required to determine the right solution for the issue. Completing assigned backup checks. Updating ticket status as they change. Updating client and internal documents to reflect changing environments and knowledge. The network diagram of XYZ is: Student Assessment Guide: ICTNWK540 Version: v23.0 Page 23 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Activity 1: (Role Play on preparation of designing of a network server as per the business requirements): The IT department has decided to arrange a meeting and discuss with the other stakeholders about the planning, designing and implementation of the network server. The IT department also needs to consult with the stakeholders about the benefits of the implementation of the network server and then acquire the approval from the competent authority. In this role play the stakeholders include the General Manager, IT Manager, and System Administrator. The system administrator will elaborate and discuss the planning and designing of the network server. While the IT Manager will be responsible for consideration of the budget issues. The Assessor will act as the IT Manager and will supervise all the discussion of the System Administrator. While another student will act as General Manager. The trainer will provide you 10-15 minutes to complete the role play. Additional time will be given as required. Your trainer will observe you during the role play and complete the following performance checklist. In the role play, the Student will act as the System Administrator and will need to discuss the following and also, he is responsible for the recording of the minutes of meetings and get these signed from the authorised personals, the template of the minutes of meetings is given below: Discuss with the stakeholders about the requirements of the network server. You need to Student Assessment Guide: ICTNWK540 Version: v23.0 Page 24 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers elaborate the requirements for the network server for the organisation. Discuss with the IT Manager, about the business problems, opportunities, scope and budget of the implementation. Discuss and identify the hazards and risks associated and discuss these with the IT Manager. Also, discuss and take suggestions from both the Managers that the implementation of the network server is done properly and the task is coordinate with the input of all the stakeholders. Ensure that everyone at the role play give their input properly. Discuss the site clean-up and restoration for the server room. Get the minutes of meetings signed by the General Manager. You are required to complete the following meeting minute’s template and submit to your trainer/assessor. Minutes of meeting Write your answer here Following issues were discussed during the meeting Excessive use of paper - reducing the use of paper is one of the concerns, as more papers being used and get wasted everyday No server management – Server management is necessary as it’s a financial component that required to be up and running all the time. Data is not backed up properly - data back is necessary in case of any failure or device fail. Wi-Fi is not working most of the time – Network needs to be investigated and configured in a way to avoid latency Data loss issues - databack is need to keep the files safe in case of any disaster. VPN and securities issues – VPN is required to encrypt the data and communicate through secure tunnel. Meeting Objective Write your answer here - Reduce use of paper - Efficient server management - Network security - Data backup solution - Data loss preventions - Internet connectivity all the time Student Assessment Guide: ICTNWK540 Version: v23.0 Page 25 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Attendees Write your answer here CEO Manager IT Technician Consultant Operations manager And other stakeholders Venue Write your answer here Board Room for conferences Date Write your answer here 26/07/2023 No Points Discussed Actions Suggested Target Date Student Assessment Guide: ICTNWK540 Version: v23.0 Page 26 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers 1 Major issues with current infrastructure Implement efficient way to rectify the issues 21/06/2023 Minor issues with current infrastructure Implement efficient way to rectify the issues 21/06/2023 Solutions to the issues Create a plan 17/05/2023 Signature of attendee 1: Signature of attendee 2: Signature of attendee 3: Signature of attendee 4: D. Task D – Test and reconfigure network servers Task D instructions Answer the questions below to demonstrate your knowledge of network testing. D1. Answer the following questions: A. What are the steps included in validating changes for a system? Write 100-150 words. B. Explain the importance of server testing? Write your answer in 30-50 words. Write your answer here A. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 27 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers - Conduct an audit - Establish a risk framework - Stay current with the changes - Leverage - Perform additional testing B The services you need to create your apps are tested on servers to ensure they function as intended. A testing suite includes a variety of test scenarios that show both what is operating well and what is working incorrectly, such as requesting another user's secure data or signing in without a password. D2. How to test the network server return error code 1603 and how to solve this error? Add snapshots. Write your answer here. Error 1603 may be due to an overflowing Windows Temp folder. Therefore, cleaning up temporary files as usual may help fix the problem. This can be done using special third-party programs or using the Windows Disk Cleanup tool. If you want to use the built-in tool, enter Disk Cleanup in the search bar. Restart the Windows Installer service if nothing changed and Installation Error 1603 persists. Open a Run window, type services.msc to access the Windows Services section, and then click OK. Locate the Windows Installer service in a new window, then click on it to access its properties. If this service is already operating, click Start first, then Stop. the Apply and OK buttons. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 28 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers After then, Windows Installer needs to be registered again. Enter msiexec / unregister in the Run text box to accomplish this, then hit OK. Next, type msiexec / regserver to assist with Windows Installer registration. Error Code 1603 may appear if the function for generating a short file name is disabled. In this instance, you can modify the NtfsDisable8dot3NameCreation registry value using the registry. So, to launch the Registry Editor, type regedit into Run. Next, take the following path: Double-click the DWORD NtfsDisable8dot3NameCreation at ComputerHKEY_LOCAL_MACHINEMSYSTEMCurrentControlSetControlFileSystem. In order to save the modifications, modify the DWORD value to 0. Restart your laptop or PC after that. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 29 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers D3. Explain the process of error reporting in Microsoft Windows Server? Write your answer in 100- 150 words. Write your answer here. Windows Error Reporting, also referred to as Werfault.exe, is a process that handles your error reports. Whenever one of your apps crashes or runs into an issue, you can report this to Microsoft and enhance their ability to fix the issue in a future update. Extraordinary high CPU consumption. This process's high CPU use may be the most obvious problem. Your computer will naturally begin to run slower when your CPU is under a lot of strain. This can progress to the point that it becomes difficult to carry out even the simplest operations without waiting for everything to load. Registry keys or system files that are damaged or missing. You can begin to encounter problems with Windows Problem Reporting (Werfault.exe) if your system files or Registry keys were corrupted or deleted. Error in application Werfault.exe. There is always a chance that Werfault.exe will experience further faults. These problems may prevent you from using specific programmes or Windows features. Werfault.exe needed to shut down because it ran into trouble. We apologise. E.Task E – Complete and document network design and installation Task E instructions For Task E, you have to continue using the case study scenario. E1. Activity 2: Report - (Documentation of the plan and design of the Network Server) Once the discussion and the approval of the project have been acquired, you need to prepare a report on the design and the planning of the implementation of the Network Server. Also, once the report is completed, you need to be signed from the IT Manager for the approval of the designing phase and initiation of the implementation. The report will include the following points and also complete the template given below: Student Assessment Guide: ICTNWK540 Version: v23.0 Page 30 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Requirements for the data migration for the new server Specifications of the network server including system requirements (Windows Server or Oracle Linux Server or Ubuntu Server) Prepare network design documentation including configuration of network services, server applications security and redundancy Checklist for the installation of the server for the quality assurance process Test plan as per the requirement of the organisation along with the performance standards and quality expectations Details of Work Health and Safety processes and procedures Details of safety hazards associated in the server room along with their mitigation and implementation of the risks control measures Details of backup of the system for the installation procedures Ask your manager to review the prototype design and update the design based on the feedback. Obtain sign-off from your manager (Trainer/assessor) Report on Design and Planning of the Network Server Write your answer here There are more than 100 users, among them some student users, admin users, server administrators, and core technical engineers are trying to improve the service. Because data transmission will be accomplished utilising virtualization techniques, the needed bandwidth for server implementation is around 100MBPS. Below are several prerequisites that must exist in order for the server to function. - The main component of network connectivity is wireless network connection. - The server that will host programmes, - the email servers that will receive user emails. - the file servers that will store user data. Objective: The major goal is to construct a secure server where user information will be kept. Budget: The budget is expected to be around $10000. Scope: The project will only be operational within the boundaries of the currently chosen organisation in Student Assessment Guide: ICTNWK540 Version: v23.0 Page 31 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers order to complete the implications and enhance the performance of the system. Opportunities for business growth include broadening the context of learning for students and faculty so they can deliver high-calibre performances for the benefit of the company. Network: Hardware specifications 6 switches 1 Router(s) 110 end devices 1 server computer Costs: Hardware Quantity PriceSwitches 6 6x$415 = 2490Router 1 500End Devices 110 110*300=33000Server 1 500Total =36490 Student Assessment Guide: ICTNWK540 Version: v23.0 Page 32 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Hardware Quality Price Switches 6 6x$415 = 2490 Router 1 500 End Devices 110 110*300=33000 Server 1 500 Total =36490 Purpose Write your answer here Setting up secure network Remedies of current issues Department Write your answer here IT department Operations Other departments of Business Stakeholders Write your answer here CEO IT Manager Technician Consultant Users Other stakeholder Student Assessment Guide: ICTNWK540 Version: v23.0 Page 33 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Supervised by Write your answer here Neil – IT Department Requirements for the data migration Write your answer here When a system is offline, it is referred to as downtime.This typically happens when a planned event (a planned event) or normal maintenance (an unplanned event) causes the system to malfunction. The phrase is frequently used to refer to networks and servers. Specifications of the network server (Windows Server 2016) and Installation Checklist Write your answer here To define complete validation points and integrate service-based terms and conditions, network security firewalls should be employed. This will improve network quality and allow for the adoption of appropriate encryption and decryption models. Installation Checklist Student Assessment Guide: ICTNWK540 Version: v23.0 Page 34 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Write your answer here Task No Task details Status 1 Verify internet access and DNS name resolution Completed 2 Change the time zone in date and time setting Completed 3 Enable remote desktop Pending Details of design, configuration of network services, server applications security and redundancy Write your answer here To define complete validation points and integrate service-based terms and conditions, network security firewalls should be employed. This will improve network quality and allow for the adoption of appropriate encryption and decryption models. Prototype design Write your answer here Prototype design is mentioned in the server implementation. Test Plan Write your answer here Student Assessment Guide: ICTNWK540 Version: v23.0 Page 35 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Test Name Test Process Status / Result Comments Compatibility Testing Research Completed Test plan completed using unit testing Security Testing Research Completed Test plan completed using unit testing Access Testing Research Pending Test plan completed using unit testing Functionality Testing Research Completed Test plan completed using unit testing Load Balancing Testing Research Pending Test plan completed using unit testing Performance Testing Research Pending Test plan completed using unit testing Work Health and Safety processes and procedures Write your answer here - Before beginning an installation, spread out the support bar or legs on the equipment rack. - Always load equipment into a rack from the bottom up to avoid any potential safety issues. The rack won't topple over from being top-heavy. Use your rack's anti-tipping bar to keep it from tipping when installing equipment. - The operating ambient temperature of the rack environment may be higher than room ambient temperature if the server is put in a closed or multi-unit rack assembly. - The amount of airflow necessary for the equipment to operate safely should not be compromised during installation of the equipment in a rack. Safety Hazards and their Solution Write your answer here - The operating ambient temperature of the rack environment may be higher than room Student Assessment Guide: ICTNWK540 Version: v23.0 Page 36 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers ambient temperature if the server is put in a closed or multi-unit rack assembly. - The amount of airflow necessary for the equipment to operate safely should not be compromised during installation of the equipment in a rack. Backup of the system for the installation procedures Write your answer here SIGN –off Document 1. Implementation Summary Start Date 17/05/2023 Finish Date 26/06/2023 Student Assessment Guide: ICTNWK540 Version: v23.0 Page 37 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers 5. Document Signatures Name Description Signature Date Neil IT 14/06/2023 John Operation 17/06/2023 E2. Activity 3: You need to implement the network server solution as per the given points: Backup the data to make sure the preparation for the installation of the network server Install the Network operating system as per the report prepared in the assessment task 2 (install Windows Server or Oracle Linux Server or Ubuntu Server) Install Antivirus software on the server Install printer services on the server Install third party troubleshooting and server monitoring tools on the server Patch and set the automatic updates for the Server Operating system to ensure security and reliability. Configure the following server network and security services, including: o Domain name system (DNS) o Dynamic host configuration protocol (DHCP) o Web and proxy mail o File transfer protocol (FTP) o Firewall. o NTP Implement the backup and restoration in case to avoid data damage during the event of a disaster Complete the test Plan and submit the document Student Assessment Guide: ICTNWK540 Version: v23.0 Page 38 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 39 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 40 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 41 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 42 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 43 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 44 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 45 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 46 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 47 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers Student Assessment Guide: ICTNWK540 Version: v23.0 Page 48 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers E3. Answer the following Questions: A. What are the factors to consider while preparing the documentation for server configuration and operational changes? Write your response in 100-150 words. What are the benefits of cleanup and restoration of an ICT worksite as per client’s satisfaction? Write your response in 150-200 words. Provide evidence of your configuration here. Consider inventory first - Making a list of all the network hardware is step one. After that, finish a software inventory that lists all of the operating systems, virtual machines (and all of their operating systems), drivers, apps, and associated licencing data. Additionally, it is advisable to keep all of these devices' manuals together. Record the settings and scripts that serve as the foundation for each unit's operations. Make a Map - The network map is the most crucial part of a server paper. The first step is to physically identify and label each piece of equipment in your infrastructure (for advice, read our page about server room setup). Draw a diagram of your office space and give each space a name. After that, make a drawing of each piece of equipment in the room and write down its name. The connections between each piece of equipment should then be mapped. In the event of a service breakdown, knowing exactly where your gear is and which connections it is a part of is essential. Log every interaction - Even if you are not doing any actions that might appear to influence the connections or performance, such as cleaning the equipment, keep a detailed record of any actions involving the server or hardware. If a problem arises, the technician attempting to fix it can notice a connection between acts that you didn't. To ensure that all revisions are done in the same document, try to preserve just one copy. Information that is out of date is more likely when there are more copies. Store It In Plain Sight - Keep your data in a secure location that's simple to locate in an emergency, whether you've organised it all on a few flash drives or in a binder. You should also find all of your manuals right here. A piece of equipment's manual should be retired when it becomes obsolete. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 49 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers E4. What are the seven (7) factors to consider while analyzing and documenting the data migration requirements? Write your answer in 100-150 words . Provide evidence of your configuration here. Identify the data format, location, and sensitivity - Determine the data you are transferring, its present format, its location, and the format it should be in after the migration before you start the process. You can approach the project with knowledge by identifying this information. You can identify potential dangers during this pre-planning process that you'll need to account for before the transfer or realise that additional security precautions must be taken while you relocate particular data. You can avoid making a crucial mistake during the actual relocation procedure by doing this preliminary planning step. Planning for the size and scope of the project - Define the scope of the data migration plan after you are aware of the data being moved. Create a reasonable budget and a plan for the resources you'll need to use during the move. Backup all data - Make sure all of your data is backed up before the transfer, especially the files you'll be moving. You will be able to fix any errors that arise during migrating, such as corrupt, incomplete, or missing files, by returning the data to its initial state. Assess staff and migration tool - Data migration can be a labor-intensive task, especially if you're moving many files, a complicated migration, or sensitive data. Execution of the data migration plan Testing of final system Follow-up and maintenance of data migration plan Student Assessment Guide: ICTNWK540 Version: v23.0 Page 50 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers 4. Student Self Checklist A. Student Self Checklist for Tasks A - D Candidate name: Unit of Competency: ICTNWK540 Design build and test network servers Instructions: Place a tick ‘ ’ in the Yes (“Y”) column for each question you have completed all parts for. Task A - Plan and design network servers to meet business requirements Did you: Y A1: Explain the features required for Network Operating System (NOS). What are the two (2) latest server applications compatibility issues and their resolution procedures? A2 : Summarize the following network service configurations: A. Domain name system (DNS) B. Dynamic host configuration protocol (DHCP) C. File transfer protocol (FTP) D. Mail E. Network time protocol (NTP) F. Proxy G. Server messages block (SMB) H. Web Write 50 to 100 words for each of the configuration A3 : Explain the following network service management terms: A. Start B. Stop C. Restart D. Start on boot Write your response in 150-200 words. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 51 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers A4 . Answer the following questions: A. What are the five (5) essential features of network service security? Write your answer in 150-200 words. B. What are the steps involved in configuring server firewall on Windows server 2012? A5: Answer the following questions: A5: What is the importance of consultation with the key stakeholders and how does it help to effectively coordinate the task? Write your response in 100-150 words. B: What is the importance of the Work Health and Safety (WHS) processes and procedures at a workplace? Write your response in 100-150 words. A6 : Answer the following questions. A. Explain network services in your own words. In 50-100 words. B. List any five network services and network connectivity devices A7 : Explain the following terms in 30-100 words for each: A. Business problems B. Opportunities C. Scope D. Budge Task B – Prepare for network server installation Did you: Y B1: Answer the following questions. A. What are the two (2) network troubleshooting tools and techniques? Write your response in 100-150 words. What are the five (5) network diagnostic utilities? Write 30-50 words for each B2: Answer the following questions. A. Briefly explain the importance of the following installation media in 30-50 words each. a. CD b. DVD c. universal serial bus (USB) d. boot disk e. network and script (automated install) f. deployment services B. Briefly explain boot process and diagnosing boot failures related to network server. Answer in 50-100 words. C. Briefly explain operating system rescue environment related to network server. Answer in 50-100 words. B3. Answer the following questions. A. Briefly explain the importance of operating system help and support utilities in network server environment. Answer in 50-100 words. Student Assessment Guide: ICTNWK540 Version: v23.0 Page 52 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers B. Briefly explain two performance monitoring tools and tuning options related to Windows server 2012. Answer in 50- 100 words. C. Briefly explain two compatibility issues and resolution procedures related to Windows server 2012. D. List and explain three high availability options for servers. Answer in 50-100 words. Briefly explain file and print management in 50-100 words. B4. Answer the following questions. A. Explain user authentication and directory services for the network server. Answer in 50-100 words. B. Explain the steps you will follow to implement backup and restore functions on the network server. Answer in 150-200 words. C. In your own words, explain error and event logging and reporting. Answer in 50- 100 words. D. Briefly explain file systems and disk partitioning schemes in 50-100 words. B5. Explain the processes involved in managing the project including the following: A. Documentation skills required for networks B. Task management C. Task scheduling utilities. Write 100-150 words for each in your response. B6. Answer the following questions: A. What are the different factors to consider while securing approval of an ICT project? Write your response in 50-100 words. B. What are the factors to consider while designing a client report? Write your response in 100-150 words. B7. Answer the following questions: A. What is meant by prototype design? Write your answer in 50-100 words. B. What are the factors to consider for the network server installation checklist for the quality assurance? Write your response in 100-150 words. Task C – Build and configure the servers according to design Did you: Y C1: Discuss with the stakeholders about the requirements of the network server. You need to elaborate the requirements for the network server for the organisation. Discuss with the Finance Manager, about the business problems, opportunities, scope and budget of the implementation. The Finance Manager will arise the Student Assessment Guide: ICTNWK540 Version: v23.0 Page 53 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers financial constraints but you need to explain the benefits of paperless environment as per the scenario. Discuss and identify the hazards and risks associated and discuss these with the IT Manager and Operations Manager. Also, discuss and take suggestions from both the Finance Manager and the Operations Manager that the implementation of the network server is done properly and the task is coordinate with the input of all the stakeholders. Ensure that everyone at the role play give their input properly. Discuss the site clean-up and restoration for the server room. Get the minutes of meetings signed by the General Manager. C2: Complete the template of minutes of meetings? Task D – Test and configure network servers Did you: Y D1 : Answer the following questions: A. What are the steps included in validating changes for a system? Write 100-150 words. B. Explain the importance of server testing? Write your answer in 30-50 words. D2: H ow to test the network server return error code 1603 and how to solve this error? Add snapshots D3: Explain the process of error reporting in Microsoft Windows Server? Write your answer in 100-150 words. Task E – Complete and document network design and installation Did you: Y E1 : Documentation of the plan. E2: Design of the network E3: Answer the following Questions: A. What are the factors to consider while preparing the documentation for server configuration and operational changes? Write your response in 100-150 words. What are the benefits of cleanup and restoration of an ICT worksite as per client’s satisfaction? Write your response in 150-200 words. E4. What are the seven (7) factors to consider while analysing and documenting the Student Assessment Guide: ICTNWK540 Version: v23.0 Page 54 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTNWK540 - Design, build and test network servers data migration requirements? Write your answer in 100-150 words Student Assessment Guide: ICTNWK540 Version: v23.0 Page 55 of 55 Developed by: ACBI Approved by: DoS Issued: April 2023 Review: April 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help