Reference no: EM133107317
PART A
Question 1. List two (2) quality assurance processes for monitoring and eliminating system and software faults.
Question 2. Explain three (3) network data flow collection and analyzing tools. You must include screenshots and functionality for each tool.
Question 3. List the steps you must take to resolve the following hardware and software related problems.
• Slowness of computer
• Blue screen.
• Computer not booting
Question 4. What is the process to change the automatic Windows 10 updates to the manual updates? Explain the process in 100-150 words.
Question 5. Give an example to explain how you can create and modify the environment variables systematically. Write your answer in 200-300 words.
Question 6. Explain in 200-300 words how will you rectify the internet connectivity related problems in windows 10.
Question 7. What fields must be present in the template to record the network problem. (List any three (3))
Question 8. Explain three (3) change management tools. Explain each in 100-150 words
Question 9. Write two (2) change control procedures for any ICT based organisation. Explain each procedure in 100-150 words
Question 10. Describe two (2) troubleshooting methodologies used for any hardware problem occurring due to newly installed hardware? (100-150 words for each method)
Question 11. Describe five (5) common computer problems and their possible solutions?
PART B
Question 1 What is a gateway? What function(s) does this perform?
(Write detailed answer in full sentences recommended length one paragraph)
Question 2 What are the 3 FTP transfer modes? Briefly describe each
(Write detailed answer in full sentences recommended length one paragraph)
Question 3 What is ‘Internet Control Message Protocol' (ICMP)? What are the functions of this?
(Write detailed answer in full sentences recommended length one paragraph)
Question 4 What is ‘User Datagram Protocol' used for?
(Write detailed answer in full sentences recommended length one paragraph)
Question 5 Outline the functions of the following protocols:(Write detailed answer in full sentences recommended length one sentence each)
a) BOOT Protocol
b) AARP
Question 6 What are the 3 principle categories of Ethernet?
(Write detailed answer in full sentences recommended length one sentence each)
Question 7 List 4 examples of useful data / information that can be obtained using a Network Monitoring Program
Question 8 Outline the functions of the following AppleTalk protocols:Write detailed answer in full sentences recommended length from one sentence to one paragraph each
a) AARP
b) NBP
Question 9 What is the difference between a router and a switch? Discuss
(Write detailed answer in full sentences recommended length one paragraph)
Question 10 List 3 methods of security that can be utilised for VoIP technology
Question 11 What is a firewall? What is the purpose of a firewall?
(Write detailed answer in full sentences recommended length one to two paragraphs - be sure to answer both parts of this question!)
Question 12 List 3 types of data security technologies
Question 13 What is DHCP? What are the reasons this protocol would be used?
(Write detailed answer in full sentences recommended length one to two paragraphs - be sure to answer both parts of this question!)
Question 14 Outline the structure of UTP cables. How does the number of twists affect quality?
(Write detailed answer in full sentences recommended length one to paragraph - be sure to answer both parts of this question!)
Question 15 Outline the structure of STP cables. Why would these be selected over UTP cables?
(Write detailed answer in full sentences recommended length oneparagraps - be sure to answer both parts of this question!)
Question 16 What are the 3 types of configurations of STP cables?
Question 17 Outline the structure of coaxial cables. List an advantage and disadvantage of this type of cable.
(Write detailed answer in full sentences recommended length one sentence to one paragraph)
Question 18 What are the following cables rated to:
a) CAT-5is rated to ...........
b) CAT-5eis rated to ...........
c) CAT-6is rated to approximately ...........
Question 19 List 3 advantages of wireless networks
Question 20 List 3 disadvantages of wireless networks
Question 21 Briefly outline the contracting procedures included in Assessment 1 at your simulated workplace
(Write detailed answer in full sentences recommended length one sentence to one paragraph)
The following questions relate to the Operating System: Windows 10
Question 22 List 5 software packages supported by this operating system
Question 23 List 5 features of this operating system
Question 24 List 4 requirements that must be checked prior to installing software on computer with this OS?
Question 25 Outline the procedures you would follow to install software (as part of your hardware installation) on this OS.
(Write detailed answer in full sentences recommended length one sentence to one paragraph)
Question 26 Choose one hardware component installed on this OS.
Outline the installation procedures
(Write detailed answer in full sentences recommended length one sentence to oneparagraph)
PART C
Question 1 What is a high strength password? Why would it be a good idea to have password strength requirements for user logins at a workplace?
Give an example and explain why with a full sentence answer
Question 2 List 5 specific security options that can be edited for a user when setting up their login
Question 3 List 5 specific hardware components that need to be checked to ensure compatibility when installing an operating system
Question 4 When installing a Windows operating system (e.g. Windows 2000) what file system should be selected? Why? explain your answer using full sentence/s
Question 5 List 3 methods that can be used to install operating systems
Question 6 What is software integration / cross-over software?
Question 7 List 3 diagnostic tools that are in-built in an operating system
Question 8 List 3 diagnostic tool products that can be used to diagnose operating system issues
Question 9 Discuss the principles of access control in detail. How can a business ensure access to data is restricted to personnel who are adequately authorised?
Give full sentences for answer, minimum length one paragraph
Question 10 What is a firewall? What is the purpose of a firewall?
Question 11 List 5 ways a computer can become infected with a virus
Questions 12 - 14 relate to the operating systems: Windows 10 and MAC OS Catalina
Question 12 List 5 software packages supported by this operating system
Question 13 List 5 features of this operating system
Question 14 List 4 operating system requirements that must be checked prior to installing the OS?
Question 15 What is the boot process? Full sentence answer please
Question 16 What is BIOS? Full sentence answer please
Question 17 How can you access BIOS at start-up? Full sentence answer please
Question 18 What is an Internet Protocol? Full sentence answer please
Question 19 What is an IP address and how does it work? Full sentence answer please
Question 20 What is a dynamic IP address? Full sentence answer please
Question 21 What is a subnet? Full sentence answer please
Question 22 What is print spooling? Full sentence answer please
Question 23 Why is it important to have a print queue management system in place?
Full sentence answer please
Question 24 Why is it important to have a print queue management system in place?
Full sentence answer please
Question 25 For 2 different OS, list a remote desktop product that is available.
Full sentence answer please
Question 26 List 3 common compatibility issues that face Windows 7, and how to work around them.
Compatibility Issue Work-around
Question 27 List 2 common compatibility issues that face Mac OSX Snow Leopard, and how to work around them.
Compatibility Issue Work-around
Question 28 What are the roles and responsibilities of employees relating to OH&S / WHS?
Give at least three
Question 29 Describe in detail the ergonomically correct way to sit at a computer desk.
Full sentence answer please, minimum two paragraphs
PART D
Question 1 What is PING? How and when is it used? Please provide a detailed answer using full sentences, suggested length one to two paragraphs
Question 2 What are Utility Software Programs? Please provide a detailed answer using full sentences, suggested length one paragraph
Question 3 List 4 different OS tools / utilities, and what they are used for
Question 4 Explain what log files are, their purpose, and what they do Please provide a detailed answer using full sentences, suggested length up to one paragraph
Question 5 What is divide and conquer in relation to Algorithm Design? Please provide a detailed answer using full sentences, suggested length one to two paragraphs
Question 6 What are the 5 components of Greedy Algorithms
Question 7 Describe the 4 components of functional testing listed below Please provide a detailed answer using full sentences, suggested length one or two sentences
Unit Testing
Integration Testing
Systems Testing
Acceptance Testing
Question 8 Describe the 4 components of non-functional testing listed below
short answer, dot points is adequate or sentences
Performance, Load, Stress Testing
Security, Vulnerability Testing
Usability Testing
Compatibility Testing
Question 9 Describe the following programming structuring short answer, dot points is adequate or sentences
Sequence
Selection
Iteration
PART E
Question 1a: List nine (9) essential elements of a Data Security Policy for an organisation.
Question 1b: Briefly explain the organisation structure. In 20-40 words.
Question 1c: As a network specialist, why you need to review organisational structure and functionality to implement data integrity? Answer in 50-70 words.
Question 2: a) What do you understand by security audit? Write your answer in 100-150 words.
b) What are the seven (7) factors to be considered for a security audit? Write your answer in 50-100 words.
Question 3: What do you understand from the term User Account Control (UAC)? Write your answer in 50-100 words.
b) What are the seven (7) reasons that trigger a UAC prompt in Windows?
Question 4: What are the seven (7) steps you will follow to set the permissions for file and folders to secure your data?
Question 5: Explain each of the following in 50-100 words:
a. Microsoft Software Inventory Analyzer - MSIA
b. MSINFO32
c. DxDiag
d. E-Z Audit
Question 6a: Briefly explain asset tracking. Answer in 50-100 words.
Question 6b: List six important aspects you should task prior to decide the asset management software.
Question 6c: Explain the importance of developing a system to record assets. Write your answer in 150-200 words.
Question 7a: List the five (5) factors to be considered while choosing an antivirus solution for a corporate office IT setup.
Question 7b: Briefly explain two current antivirus solutions for server security. Answer in 100-150 words.
Question 7c: Briefly explain two current antivirus techniques for server security. Answer in 100-150 words.
Question 8: How to install and activate AVG Antivirus? Explain in 100-150 words and add screenshots of the steps involved.
Question 9: a) What is the importance of testing the functionality of the antivirus? Write in 100-150 words.
b) Explain the steps involved to test the functionality of the antivirus. Write your answer in 100-150 words.
Question 10: Explain four (4) major environmental threats to data centers and computer rooms. Write your answer in 150-200 words.
Question 11: List the five (5) key elements required to be documented in regard to data center environmental concerns.
Question 12: Fire Suppression System is implemented in data centers to protect from fire. What is to be considered for implementing data center fire suppression systems? Write 150-200 words for your answer.
Question 13: a) List the ten (10) different types of backups used for data.
b) What are the seven (7) commonly used backup media options for taking the backup?
Question 14: a) What are the three (3) steps involved in implementing a backup solution?
b) List the five (5) compelling functionalities necessary for every enterprise backup solution.
c) List the four (4) different methods to restore the backed-up data.
d) What do you understand by real-time backup, synchronization and replication? Write your answer in 100-150 words.
Question 15: Read the following case study and answer the question.
You are working as an IT administrator in a small rganization. The rganization name is CCI media solution. The rganization is providing a range of online service including website design, SCO, Video creation and digital marketing for different businesses.
The organisation has 20 employees including management, marketing, account. Organisationdo not have any policies and procedures related to IT operation. The organisation is using following hardware and software:
• Windows server 2012
• Windows 10 for users
• Cisco router and switch
• Management is using the remote login to work from home
Question: You manager has asked you to create you a basic procedure for backup, restore and rollback of the data.
Question 16: a) List any five (5) network performance monitoring tools and describe any two tools including their functions.
b) What are the five (5) factors to consider while implementing network performance tool?
Question 17: List the ten (10) essential elements to be considered while developing a report on network performance.
Question 18 a: Briefly explain disaster recovery processes. Answer in 150-200 words.