ICTSAS517 Use network tools Assignment

Assignment Help Basic Computer Science
Reference no: EM132427778

Qualification - ICT50118 Diploma of Information Technology

Subject - Server Configuration and Tools

Unit Codes
ICTSAS517 Use network tools
ICTSAS518 Install and upgrade operating systems
ICTNWK505 Design, build and test a network server

Assessment 1

Part A - Knowledge Questions

The purpose of this assessment task is to assess the students' knowledge required for using command-line, hardware, and software tools to manage a network.

Question 1
Summarise what a phishing attack is, including its key features. Write your response in 150-200 words.

Question 2
Summarise why data theft is a major challenge for an organisations network security. Write your response in 150-200 words.

Question 3
Summarise why viruses, Trojan horse, malware, and worms are major problems /challenges for an organisations network security.
1. What steps network administrator may take to ensure that the network system is secure.
2. identify two software solutions that can be used to secure against these threats.
Write your response in 150-200 words.

Part B - Practical Project

The resources required for these assessment tasks:
• Windows client-server network with Windows Server 2016 Standard that implements ADDS, DNS, and DHCP scope of IPv4 addresses
• Computers connected to the network
• Hardware tools such as cable tester, multimeter etc
• Network monitoring tool
• Server
• A live network
• Cables
• Router and switches

Scenario:

You have recently graduated as an IT support technician, and you have recently been hired by a large enterprise organisation. The organisation implements a traditional client-server network using Windows Server 2016 for managing the domain using Active Directory, DNS, and DHCP services (using IPv4 scope). Employees use Windows 10 desktops to undertake their work duties by accessing server resources once they have been authorised and authenticated.

It is expected that you will undertake the following maintenance duties and responsibilities as per the following Maintenance procedure task list after your orientation:

As part of your orientation and training in your new job, the Network Administrator wants to gain an understanding of your current skillset and knowledge. They have devised a number of tests so they can gain knowledge as to whether you are able to undertake the required duties as per the Maintenance procedure or whether further training is required before you undertake these duties.

Activity 1: (Command-line tools uses)
The Network Administrator wants to use a range of command-line tools in a Windows environment to ensure that you can use them correctly. This includes the ping, ipconfig, and netstat commands. You will be expected to use these tools as part of your troubleshooting duties after the orientation phase has been completed.

For this task you are to open Command Prompt or PowerShell in a Windows 10 device connected to a network and then complete the following tasks:
1. Execute the ping command to verify the localhost (127.0.0.1)
2. Execute the ping command to verify that the client can communicate with the server
3. Execute the netstat command to display detailed network statistics by protocol
4. Execute the ipconfig command to get details of all TCP/IP network configurations on the device
5. Execute the ipconfig command to release the IP address for the device
6. Execute the ipconfig command to renew the IP address for the device
7. Perform Trace Route test on Command Line Tool

Activity 2: (Hardware tools)
The Network Administrator has replicated a support request for a user that is having difficulty connecting to the network. They have asked you to test whether there is an issue with the Ethernet cable that is connected to the Network Interface Card (NIC) in the device to rule this out as the connectivity issue. The purpose of this test is to ensure that you can use a hardware tool correctly and to required safety standards.
For this task you need to:
1. List the hardware tool and its functionality to use for this task.
2. Test the Ethernet cable
3. List the work health and safety requirements during this process.
4. Analyse and publish the test results to determine whether the cable is working correctly or has any issues.
5. Furthermore, as part of the maintaining and managing the existing network, your Network Administrator has also asked you to research and identify appropriate hardware networking tools in terms of their functionality that can be used in network environment.
a. Identify and list some of useful network hardware tools explaining their functionality, and how you could manage the network with the aid of those tools.
b. Review and describe any WHS (Work Health and Safety) requirements for the safety while using those tools.

Activity 3: (Software tools uses: Network monitoring)
The Network Administrator has asked you to use a network monitoring on the live network to determine that you can use the tool correctly to determine possible vulnerabilities and security issues with the network, and that you can analysis the monitoring results.
For this task you need to:
1. List the network monitoring tool and its functionality for this task.
2. Capture the network traffic using the Network Monitoring tool.
3. Analyse the result to determine possible vulnerabilities for the network.
a. Download a Wireshark Application
b. Install a Wireshark in physical/or virtual Windows machine
c. Capture the network traffics
d. Identify the IP addresses of the Source and Destination
e. Identify the protocol being used
f. Observe/review/analyse the test results to determine if there is any suspicious network traffics/any unrecognised IP Addresses/or potential vulnerabilities, and a method to isolate or resolve the issue by terminating/killing the processes if required

Your project activity report should include all the required screen shots of the processes you have gone through as part of the evidence.

Assessment 2

Case Study, Practical

Research and Practical Project

The resources required for these assessment tasks:

• A site where server installation may be conducted
• Relevant server specifications
• Cabling
• Networked (LAN) computers
• Server diagnostic software
• Switching equipment
• Client requirement documentations
• Wide area network (WAN) service point of presence
• Workstations
• Relevant regulatory documentation that affects installation activities
• Industry software packages
• Appropriate OS installation compact disk or recovery boot disks
• Drivers for connected devices
• Helpdesk system
• OS service packs.

Case - Delta International College

Activity 1: Research and gather requirements
You will act as Joshua (System Administrator) and confirm the client requirements and collect hardware and relevant information from the IT manager to complete the project.

Your trainer will act as a Neil (IT manager) and will provide hardware resources and relevant information to install and configure the operating systems.
You must gather information and research on the following:
1. Organisational technical support procedures
2. Current help desk system in place
3. Installation and upgrade of OS procedures and techniques
4. Automated OS installation techniques and procedures
5. OS installation issues with hardware compatibility
6. Migration of files and issues

Activity 2: Installation, Configure, Manage, and Troubleshoot a Server Operating System;

The IT manager has asked you to perform the Installation, configuration, management, and troubleshootingof a Server Operating System as per the client requirements.
Your project activity report should include all the required screen shots of the processes you have gone through as part of the evidence.

You need to complete the following tasks:
1. Install or upgrade the server and client operating systems
2. Manage resource access e.g. Folder security
3. Configure and troubleshoot any 3 hardware devices and drivers
4. Configure and troubleshoot any 3 hardware resources
5. Configure network drivers and printers
6. Construct two (2) user profiles administrator account and a guest user
7. Plan the network setup per the requirements
a. IP address, DNS, DHCP, Gateway
8. Build and configure the servers e.g. Any required server roles and services
9. configure a local resources access
10. configure sharing of local resources
11. assign access rights to shared resources
12. organise shortcuts
13. arrange screen management

Assessment 3

Activity 1 - Gather business requirements

The IT department has decided to arrange a meeting and discuss with the other stakeholders about the planning, designing and implementation of the network server. The IT department also needs to consult with the stakeholders about the benefits of the implementation of the network server and then acquire the approval from the competent authority.

General Manager, Finance Manager, IT Manager, System Administrator and the Operations Manager are stakeholders and they will act as the clients. The IT administrator will elaborate and discuss the planning and designing of the network server. While the finance Manager will be responsible for consideration of the budget issues, the Assessor will act as the IT Manager.

You are the System Administrator and it is your responsibility to gather the business and client requirement which must include:
1. Requirements of the network server
2. Outline the business problems, opportunities, scope and budget of the implementation
3. List the hazards and risks associated in this project
4. Server room restoration upon project completion
5. Get the project signed off from the General Manager(Appendix 1 - Sign off Document)

Activity 2- Documentation of the plan and design of the Network Server

Once the discussion and the approval of the project has been acquired, you need to prepare a report on the design and the planning of the implementation of the Network Server. Also, once the report is completed you need it be signed from the IT Manager for the approval of the designing phase and initiation of the implementation. The report must include the following:
1. Requirements for the data migration for the new server
2. Specifications of the network server (Windows Server 2016)
3. Details of design, configuration of network services, server applications security, redundancy, and compatibility
4. Details of the prototype design
5. Checklist for the installation of the server for the quality assurance process
6. Test plan as per the requirement of the organisation along with the performance standards and quality expectations
7. Details of Work Health and Safety processes and procedures
8. Details of backup of the system for the installation procedures

Activity 3 - Implementation and troubleshooting of the Network Server

After the planning and documentation now are required to install the configure the server as per the requirements being defined in the scenario and in the earlier tasks.

You need to implement and troubleshoot the network server solution as per the given points:

1. Install the Network operating system as per the specifications and installation checklist (install Windows Server 2016)
2. Install Antivirus and troubleshooting tools as additional tools and third party software applications
3. Patch and set the automatic updates for the Server Operating system to ensure security and reliability.
4. Configure the following server network and security services, including:
a. domain name system (DNS)
b. dynamic host configuration protocol (DHCP)
c. web and proxy mail
d. file transfer protocol (FTP)
e. firewall.
5. Restore the Backup on the server
6. Implement the backup and restoration in case to avoid data damage during event of a disaster
7. Test and troubleshoot the network servers - (Appendix 2 - Template for Testing Network Server)
a. Analyse the error reports and make changes
b. Troubleshoot the network server using the network troubleshooting tools and techniques
c. Test again as per the changes made and validate the changes as per the design and implementation documentation

Activity 4 - Changes
Once the testing of the integrated server solution is done, you need to prepare a report on the following in terms of the documentation of the network design and the installation. The report must include the following:
• Changes made to the server including the following changes:
o Configuration changes
o Operational Changes
• Complete the sign off for the implementation process

Attachment:- Server Configuration and Tools.rar

Reference no: EM132427778

Questions Cloud

Explain the formal education and reproduction argument : Explain the formal education and reproduction (hegemony) argument. Be sure to explain how education helps specifically reproduce the status quo and elite.
Draw two trees representing the two possible structures : The following sentence is structurally ambiguous, and has two distinct sets of truth conditions. Madison is pleasant and exciting or interesting.
What were the risks Peter faced in making this decision : Describe, specifically, the ethical dilemma that Peter faced.What are virtues Peter needed to act as he did? What do you think motivated him?
What is so bird-like about the hips-feet of ornithopods : What is so "bird-like" about the hips & feet of ornithopods? Categorize each of the following ornithopods according to their geologic age, body size
ICTSAS517 Use network tools Assignment : ICTSAS517 Use network tools Assignment Help and Solution, Server Configuration and Tools Assessment Writing Service - Academics Australia
Create an experiment that seeks to test the same hypothesis : How would you proceed, if you were to create an experiment that seeks to test the same hypothesis as for the Stanford Prison Experiment?
Explain aspect of african american and caribbean culture : Create a 7-8 page PowerPoint Presentation that reviews the evolution of one aspect of African American and/or Caribbean Culture. The Presentation should.
Discuss what you learned in this organizational behavior : Discuss what you learned in this Organizational Behavior course and how you might apply what you learned in the future.
Why satellites are considered turning points of mankind : In your opinion, explain why satellites are considered the most important turning points or inventions of mankind (must convince the reader). (400 words)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design a function that takes two parameters

Length of a Month Design a function that takes two parameters: year and month, and returns an integer indicating how many days long that month is. January 2009 was 31 days long, February 2009 was 28 days long, February 2008 was 29 days long, and s..

  Agent based e-learning solution

Q. Do a datailed study of the Case Study - Chapter 10 "Agent Based E-Learning Solution" and prepare a group report considering the groups created during lecture. Submit your report in A4 printed paper.

  Organization is planning to deploy sql server 2012

Your organization is planning to deploy SQL Server 2012 on two (2) servers as a production database. You have been asked to outline the steps required to implement these servers into the existing network, with the knowledge that 500 users will be con..

  Describe how to simulate a queue using two stacks

Describe how to simulate a queue using two stacks, L and R: Each of the two primary queue operations, enqueue and dequeue, should be implemented by performing

  Create a class name horse that contains a data field

Create a class name Horse that contains a data field for name, color, and birth year. Include get and set methods for these fields.

  Complexity of the ternary search algorithm

Analyze the time complexity of the following ternary search algorithm: identify two points that subdivide a sorted array into three parts.

  Proof of concept

XYZ produces a point of sale system and was awarded a Proof of Concept (POC) to one of the largest and oldest restaurants in the industry

  Calculate the change in consumer surplus

Congress has imposed a quota of 25,000 units of imported oil. Calculate the change in consumer surplus and producer surplus from this legislation.

  The brazilian federal data processing service

Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any. Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is present..

  Common-size ratio of the addition to retained earnings

What is the common-size ratio of the addition to retained earnings?

  What are the challenges to profits faced by apple

Apply Porter's five forces, what are the challenges to profits faced by Apple iOS Inc and Sirius XM Radio

  What is an sql injection attack and how can it be prevented

Describe the advantages and disadvantages of DBMS-provided and application-provided security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd