Professional Documents
Culture Documents
Assessment 1 ICTNWK543
Assessment 1 ICTNWK543
Assessment Details
Qualification Code/Title ICT50220 Diploma of Information Technology
Assessment Type Assessment -01 (Written Questions) Time allowed
Due Date Location AHIC Term / Year
Unit of Competency
National Code/Title ICTNWK543 Install, operate and troubleshoot medium enterprise switches
Student Details
Student Name Student ID
Assessor Details
Assessor’s Name
RESULTS (Please
SATISFACTORY NOT SATISFACTORY
Circle)
Feedback to student:
Student Declaration: I declare that I have been Assessor Declaration: I declare that I have conducted a fair,
assessed in this unit, and I have been advised of my valid, reliable and flexible assessment with this student, and I
result. I am also aware of my appeal rights. have provided appropriate feedback.
Signature Signature
Date
Date
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
This assessment is to be completed according to the instructions given below in this document.
Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge.
You will be entitled to one (1) resubmit in showing your competence with this unit.
If you are not sure about any aspect of this assessment, please ask for clarification from your assessor.
Please refer to the College re-submission and re-sit policy for more information.
If you have questions and other concerns that may affect your performance in the Assessment, please
inform the assessor immediately.
Please read the Tasks carefully then complete all Tasks.
To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment
along with a satisfactory result for another Assessment.
This is an Open book assessment which you will do in your own time but complete in the time designated by
your assessor. Remember, that it must be your own work and if you use other sources then you must
reference these appropriately.
Resources required completing the assessment tasks are Learner guide, PowerPoint presentation, Unit
Assessment Pack (UAP), Access to other learning materials such as textbooks, Access to a computer, the
Internet and word-processing system such as MS Word.
Submitted document must follow the given criteria. Font must be Times New Roman, Font size need to be
12 and line spacing has to be Single line.
Once you have completed the assessment, please upload the softcopy of the Assessment into AHIC Moodle.
Plagiarism is copying someone else’s work and submitting it as your own. Any Plagiarism will result in a mark
of Zero.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Reasonable adjustments
• Students with carer responsibilities, cultural or religious obligations, English as an
additional language, disability etc. can request for reasonable adjustments.
• Please note, academic standards of the unit/course will not be lowered to
accommodate the needs of any student, but there is a requirement to be flexible
about the way in which it is delivered or assessed.
• The Disability Standards for Education requires institutions to take reasonable steps
to enable the student with a disability to participate in education on the same basis as
a student without a disability.
• Trainer/Assessor must complete the section below “Reasonable Adjustment
Strategies Matrix” to ensure the explanation and correct strategy have been recorded
and implemented if applicable.
• Trainer/Assessor must notify the administration/compliance and quality assurance
department for any reasonable adjustments made.
• All evidence and supplementary documentation must be submitted with the
assessment pack to the administration/compliance and quality assurance
department.
You can appeal against a decision made in regards to your assessment. An appeal should
only be made if you have been assessed as ‘Not Yet Competent’ against a specific unit and
you feel you have sufficient grounds to believe that you are entitled to be assessed as
competent. You must be able to adequately demonstrate that you have the skills and
experience to be able to meet the requirements of units you are appealing the assessment
of.
Your trainer will outline the appeals process, which is available to the student. You can
request a form to make an appeal and submit it to your trainer, the course coordinator, or the
administration officer. The AHIC will examine the appeal and you will be advised of the
outcome within 14 days. Any additional information you wish to provide may be attached to
the appeal form.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Academic Integrity:
Academic Integrity is about the honest presentation of your academic work. It means
acknowledging the work of others while developing your own insights, knowledge and ideas.
As a student, you are required to:
• Undertake studies and research responsibly and with honesty and integrity
• Ensure that academic work is in no way falsified
• Seek permission to use the work of others, where required
• Acknowledge the work of others appropriately
• Take reasonable steps to ensure other students cannot copy or misuse your work.
Plagiarism:
Plagiarism means to take and use another person's ideas and or manner of expressing them
and to pass them off as your own by failing to give appropriate acknowledgement. This
includes material sourced from the Internet, RTO staff, other students, and from published
and unpublished work.
Plagiarism occurs when you fail to acknowledge that the ideas or work of others are being
used, which includes:
Paraphrasing and presenting work or ideas without a reference
Copying work either in whole or in part
Presenting designs, codes or images as your own work
Using phrases and passages verbatim without quotation marks or referencing the
author or web page
Reproducing lecture notes without proper acknowledgement.
Collusion:
Collusion means unauthorised collaboration on assessable work (written, oral or practical)
with other people. This occurs when a student presents group work as their own or as the
work of someone else.
Collusion may be with another RTO student or with individuals or student’s external to the
RTO. This applies to work assessed by any educational and training body in Australia or
overseas.
Collusion occurs when you work without the authorisation of the teaching staff to:
• Work with one or more people to prepare and produce work
• Allow others to copy your work or share your answer to an assessment task
• Allow someone else to write or edit your work (without rto approval)
• Write or edit work for another student
• Offer to complete work or seek payment for completing academic work for other
students.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Both collusion and plagiarism can occur in group work. For examples of plagiarism, collusion
and academic misconduct in group work please refer to the RTO’s policy on Academic
integrity, plagiarism and collusion.
Plagiarism and collusion constitute cheating. Disciplinary action will be taken against
students who engage in plagiarism and collusion as outlined in RTO’s policy.
Proven involvement in plagiarism or collusion may be recorded on students’ academic file
and could lead to disciplinary action.
Font must be Times New Roman, Font size need to be 12 and line spacing has to be
Single line.
Your assessment needs to be submitted as an electronic copy unless requested
differently by your assessor.
The Assessment file name for electronic copy should follow :
Referencing
Include a reference list at the end of your work on a separate page or as footnotes. You
should reference the sources you have used in your assessments in the Harvard Style.
To access a web-based tool, see Harvard Style online generator
http://www.harvardgenerator.com
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Task summary
This is an open book test.
Students need to answer all of the written questions correctly.
Answers must be word processed
Required
Access to textbooks/other learning materials
Computer and Microsoft Office
Access to the internet
Timing
Your assessor will advise you of the due date of this assessment.
Submit
Answers to all questions
Assessment criteria
All questions must be answered correctly in order for you to be assessed as having
completed the task satisfactorily.
Re-submission opportunities
You will be provided feedback on their performance by the Assessor. The feedback will
indicate if you have satisfactorily addressed the requirements of each part of this task.
If any parts of the task are not satisfactorily completed, the assessor will explain why, and
provide you written feedback along with guidance on what you must undertake to
demonstrate satisfactory performance. Re-assessment attempt(s) will be arranged at a later
time and date.
You have the right to appeal the outcome of assessment decisions if you feel that you have
been dealt with unfairly or have other appropriate grounds for an appeal.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
You are encouraged to consult with the assessor prior to attempting this task if you do not
understand any part of this task or if you have any learning issues or needs that may hinder
you when attempting any part of the assessment.
The following written questions use a range of “instructional words” such as “identify” or
“explain”, which tell you how you should answer the question. Use the definitions below to
assist you to provide the type of response expected.
Note that the following guidance is the minimum level of response required.
Analyse – when a question asks you to analyse something, you should do so in in detail,
and identify important points and key features. Generally, you are expected to write a
response one or two paragraphs long.
Compare – when a question asks you to compare something, you will need to show how
two or more things are similar, ensuring that you also indicate the relevance of the
consequences. Generally, you are expected to write a response one or two paragraphs long.
Contrast – when a question asks you to contrast something, you will need to show how two
or more things are different, ensuring you indicate the relevance or the consequences.
Generally, you are expected to write a response one or two paragraphs long.
Discuss – when a question asks you to discuss something, you are required to point out
important issues or features and express some form of critical judgement. Generally, you are
expected to write a response one or two paragraphs long.
Describe – when a question asks you to describe something, you should state the most
noticeable qualities or features. Generally, you are expected to write a response two or three
sentences long.
Evaluate – when a question asks you to evaluate something, you should do so putting
forward arguments for and against something. Generally, you are expected to write a
response one or two paragraphs long.
Examine – when a question asks you to examine something, this is similar to “analyse”,
where you should provide a detailed response with key points and features and provide
critical analysis. Generally, you are expected to write a response one or two paragraphs
long.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Explain – when a question asks you to explain something, you should make clear how or
why something happened or the way it is. Generally, you are expected to write a response
two or three sentences long.
Identify – when a question asks you to identify something, this means that you are asked to
briefly describe the required information. Generally, you are expected to write a response
two or three sentences long.
List – when a question asks you to list something, this means that you are asked to briefly
state information in a list format.
Outline – when a question asks you to outline something, this means giving only the main
points, Generally, you are expected to write a response a few sentences long.
Summarise – when a question asks you to summarise something, this means (like “outline”)
only giving the main points. Generally, you are expected to write a response a few
sentences long.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
A KVM switch is an
KVM Switch ideal interface
for a single user
that needs to
control the
functions of
multiple
computers from
a single console.
These devices
can often be
programmed
with keyboard
hotkeys that let
you easily
switch between
PCs. With the
addition of a
KVM extender,
the reach of the
switch can be
extended several
hundred feet by
transmitting
DVI, VGA or
HDMI video
signals. This
configuration
allows for local
and remote
access to the
machines. A
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
complete KVM
solution lets you
easily centralize
server
maintenance
and
management.
Managed A managed switch is
Switch exactly what it sounds
like—a switch that
requires some
oversight by a
network
administrator. This
type of switch gives
you total control over
the traffic accessing
your network while
allowing you to
custom-configure
each Ethernet port so
you get maximum
efficiency over data
transfers on the
network.
Administrators can
tweak these devices
for optimal data rate
as new devices and
users are added to the
network through
commands such as
bandwidth rate
limiting and port
mirroring. Managed
switches are also
typically the best
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
network switches to
support the Gigabit
standard of Ethernet
rather than traditional
Fast Ethernet.
Unmanaged switches
Unmanaged are generally made as
Switch plug-and-play devices
and require little to no
special installation
beyond an Ethernet
cable. The setup of
this type of switch
relies on auto-
negotiation between
Ethernet devices to
enable communication
between them. The
switch will
automatically
determine the best
data rate to use,
switching between
full-duplex mode
(where data is
received or
transmitted in two
directions at the same
time) or half-duplex
mode (where data is
received or
transmitted two ways
but only one direction
at a time).
While
some unmanaged
switches may be
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
accessed remotely,
most will require the
admin to physically
make broad changes
when setting up the
switch. If you want a
switch that will
perform the basic
functions of network
efficiency without the
need for
customization,
unmanaged may be
the best the type of
network switch for
you.
or duplex modes.
While a PoE
switch creates a PoE
network that can
support both Ethernet
and PoE-enabled
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
devices, a PoE
injector takes it up a
level. The injector
takes a device with
both PoE and non-
PoE switches and uses
those to create access
points as needed for
devices on the
network using a Cat 5
cable or better to
transmit the necessary
electricity to function
over signal wires. By
utilizing the power of
a PoE injector when
needed, you can
create a work or home
network that runs
efficiently without the
need to have
additional power
supplies installed for
various devices.
However, not all
devices are
compatible with every
PoE switch or
injector. Be sure to
check if your PoE
switch is compliant
with the 802.3af/at
standard and if the
device you want to
connect can support
that.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
2. What is a debug command, and how are they used? Write your answer in 30-50 words.
Provide three (3) examples of debug commands?
Ans:
A) What are Virtual Local Area Networks (VLANs) and why are they needed? Write
your answer in 50-100 words.
Ans: PoE stands for power over Ethernet. A PoE switch distributes power over the network
to different devices. This means any device on the network, from PCs to IP cameras and
smart lighting systems, can function without the need to be near an AC access point or
router, because the PoE switch sends both data and power to the connected devices.
While a PoE switch creates a PoE network that can support both Ethernet and PoE-
enabled devices, a PoE injector takes it up a level. The injector takes a device with both
PoE and non-PoE switches and uses those to create access points as needed for devices
on the network using a Cat 5 cable or better to transmit the necessary electricity to
function over signal wires. By utilizing the power of a PoE injector when needed, you can
create a work or home network that runs efficiently without the need to have additional
power supplies installed for various devices. However, not all devices are compatible with
every PoE switch or injector. Be sure to check if your PoE switch is compliant with the
802.3af/at standard and if the device you want to connect can support that.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
3. Explain the term Spanning Tree Protocol (STP) and its operation? Write your answer in
250-300 words
Ans: The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical
topology for Ethernet networks. The basic function of STP is to prevent bridge loops and
the broadcast radiation that results from them. Spanning tree also allows a network design to
include backup links providing fault tolerance if an active link fails.
As the name suggests, STP creates a spanning tree that characterizes the relationship of nodes
within a network of connected layer-2 bridges, and disables those links that are not part of the
spanning tree, leaving a single active path between any two network nodes. STP is based on an
algorithm that was invented by Radia Perlman while she was working for Digital Equipment
Corporation.[1][2]
In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP
provides significantly faster recovery in response to network changes or failures, introducing new
convergence behaviors and bridge port roles to do this. RSTP was designed to be backwards-
compatible with standard STP.
4. A) What is switch calling line identification (CLI)? Write your answer in 25-50 words.
C) Write six (6) basic commands used for CLI.
Ans: CLI can mean either ‘calling line identification’ or ‘connected line
identification’.
Calling line identification allows the person receiving the call to see the
caller’s number. This covers caller ID displays as well as the 1471 service
and other call-return services.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Ans: ls - List directory contents. ls -a - List all the content, including hidden files. ls -
l - List the content and its information.
cd folder name – Change the working directory to folder name. cd - Return to
$HOME directory. ...
cat file – Print contents of file on the screen. less file - View and paginate file.
Ans: Use the port-security enable command to enable port security. Use the undo port-
security enable command to disable port security.
6. Explain the term port security in cisco switches? Write your answer in 40-70 words.
Ans: When configuring the security for a network, it is important to take advantage of the
security features of all deployed devices. One of the security features available with Cisco
switches (among other vendors) is switchport security. While the name of this feature is a bit
vague, it makes it possible to limit the number and type of devices that are allowed on the
individual switchports. This article takes a look at the concepts behind the switchport security
feature.
7. Explain the difference between dynamic locking and static locking of a managed cisco
switch. Write your answer in 20-60 words for each.
Ans: Port security cannot be enabled on ports on which 802.1X is enabled or on ports that
defined as SPAN destination.
Network security can be increased by limiting access on a port to users with specific
MAC addresses. The MAC addresses can be either dynamically learned or statically
configured.
Port security monitors received and learned packets. Access to locked ports is limited
to users with specific MAC addresses.
Port Security has four modes:
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
•Classic Lock—All learned MAC addresses on the port are locked, and
the port does not learn any new MAC addresses. The learned addresses
are not subject to aging or re-learning.
•Limited Dynamic Lock—The device learns MAC addresses up to the
configured limit of allowed addresses. After the limit is reached, the
device does not learn additional addresses. In this mode, the addresses
are subject to aging and re-learning.
•Secure Permanent—Keeps the current dynamic MAC addresses
associated with the port and learns up to the maximum number of
addresses allowed on the port (set by Max No. of Addresses Allowed).
Relearning and aging are disabled.
•Secure Delete on Reset—Deletes the current dynamic MAC addresses
associated with the port after reset. New MAC addresses can be
learned as Delete-On-Reset ones up to the maximum addresses
allowed on the port. Relearning and aging are disabled.
When a frame from a new MAC address is detected on a port where it is not
authorized (the port is classically locked, and there is a new MAC address, or the port
is dynamically locked, and the maximum number of allowed addresses has been
exceeded), the protection mechanism is invoked, and one of the following actions can
take place:
•Frame is discarded
•Frame is forwarded
•Port is shut down
When the secure MAC address is seen on another port, the frame is forwarded, but the
MAC address is not learned on that port.
In addition to one of these actions, you can also generate traps, and limit their
frequency and number to avoid overloading the devices.
To configure port security:
STEP 1Click Security > Port Security.
STEP 2Select an interface to be modified and click Edit.
STEP 3Enter the parameters.
•Interface—Select the interface name.
•Interface Status—Select to lock the port.
•Learning Mode—Select the type of port locking. To configure this field,
the Interface Status must be unlocked. The Learning Mode field is
enabled only if the Interface Status field is locked. To change the
Learning Mode, the Lock Interface must be cleared. After the mode is
changed, the Lock Interface can be reinstated. The options are:
-Classic Lock—Locks the port immediately, regardless of the number
of addresses that have already been learned.
-Limited Dynamic Lock—Locks the port by deleting the current
dynamic MAC addresses associated with the port. The port learns
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Ans: By default, the switchport security feature is disabled on all switchports and must be
enabled.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
3) This step is optional, but you can specify how many MAC addresses the switch can have
on one interface at a time. If this setting is not applied the default of one MAC address is
used. The command to configure this is as follows, "switchport port-security maximum
N" (where N can be from 1 to 6272) Keep in mind the range the number of maximum MAC
address depends on the hardware and Cisco IOS you use.
4) This step is also optional, but you can define the action to take when a violation occurs on
that interface or interfaces. The default is to shut down the interface or interfaces. The
command to configure this is as follows "switch port-security violation { protect | restrict |
shutdown }"
Protect which discards the traffic but keeps the port up and does not send a SNMP message.
Restrict which discards the traffic and sends a SNMP message but keeps the port up
Shutdown which discards the traffic sends a SNMP message and disables the port. (This is
the default behavior is no setting is specified.)
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
5) You can specify the MAC address that is allowed to access the network resources
manually by using the command "switchport port-security mac-address value". Use this
command multiple times if you want to add more than one MAC address.
6) If you don’t want to configure manually every single MAC address of your organization
then you can have the switch learn the MAC address dynamically using the "switchport
port-security mac-address sticky" command. This command allow switch to learn the first
MAC address that comes into on the interface.
9. Explain the term secure shell (SSH). Write your answer in 50-100 words
Ans: SSH or Secure Shell is a network communication protocol that enables two
computers to communicate (c.f http or hypertext transfer protocol, which is the
protocol used to transfer hypertext such as web pages) and share data.
10. List seven (7) advanced switching technologies used in today's environment
Packet Switching
Datagram Approach
11. List seven (7) of the most common issues associated with network switches?
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Ans: Slow network speeds, weak Wi-Fi signals and damaged cabling are just some of the
most common network connection issues that IT departments need to troubleshoot.
Slow network. ...
Weak Wi-Fi signal. ...
Physical connectivity issues. ...
Excessive CPU usage. ...
Slow DNS lookups. ...
Duplicate and static IP addresses. ...
Exhausted IP addresses.
12. List ten (10) types of networks that are commonly used. Explain each network in 40-90
words Define Virtual Local area network (VLANs)?
Ans: Campus Area Network (CAN) The network for education. ...
Enterprise Private Network (EPN) ...
Local Area Network (LAN) ...
Metropolitan Area Network (MAN) ...
Passive Optical LAN (POLAN) ...
Personal Area Network (PAN) ...
Storage Area Network (SAN) ...
Virtual Private Network (VPN)
Wide Area Network (WAN)
Wireless Local Area Network (WLAN)
13. List eight (8) devices used to create different types of networks.
14. Complete the following table of network documentation? The first one has been
completed as an example.
Document Importance Type
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
15. What methods can you use to review an existing network design? Write your answer in
100-150 words.
Ans: As a general rule, three main methods are used to identify and analyze a customer's
existing network environment.
...
Network Design Step 2: Identifying and Analyzing the Current Network
Using existing documentation and interviews with the customer.
Auditing the current network.
Performing network traffic analysis.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
16. List five (5) elements needed to meet the technical requirements of a network.
17. Explain each of the following terms in 40-90 words for each.
1. Network segmentation
2. Network Traffic management What basics utilities are used to confirm
network operations?
Ans: Network segmentation
Network segmentation is a network security technique that divides a network into
smaller, distinct sub-networks that enable network teams to compartmentalize the
sub-networks and deliver unique security controls and services to each sub-network.
Ans: Network utilities are basic software tools designed for analyzing and configuring various
aspects of computer networks. They usually focus on one part of the network connection or
one kind of device.
Ans: Part 1: Cable the Network and Verify the Default Switch Configuration. Part 2:
Configure Basic Network Device Settings. Part 3: Verify and Test Network
Connectivity. Part 4: Manage the MAC Address Table.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Ans: The final task in the initial configuration of CSPM is generation, verification, and
publishing (distribution to the actual devices) of device commands. Device commands are
generated when you select Save and Update from the File menu.
b) Network connectors
Ans: NIC, switch, cable, hub, router, and modem.
Ans: The firmware is the program that controls the operation and functionality of
the switch. It is the combination of software and hardware that has program code
and data stored in it in order for the device to function.
Upgrading the firmware improves the performance of the device, which could
provide enhanced security, new features, and bug fixes. This process is also
necessary if you encounter the following:
You can upgrade the firmware of the switch through its web-based utility or
through the Command Line Interface (CLI).
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
This article aims to show you how to upgrade the firmware on your switch
through the CLI. If you are a beginner, you may want to upgrade the firmware
using the Graphical User Interface (GUI). This article covers the task of having
to update the boot code. How to Upgrade Firmware on 200/300 Series
Switches
Here is a second article that that explains how to upgrade the firmware using the
web-based utility. Upgrade Firmware on a Switch
22. List five (5) various methods used to back up configuration files of network switch? Write
your answer in 25-50 words.
Ans: There are several methods to choose from in order to back up and restore a
configuration:
Use a TFTP server
Use an FTP server
Use a Terminal Emulation Program
Automatic Backup of Configuration with the Kron Method
Backup Configuration to a TFTP Server
23. How can you configure trunk between two (2) switches? Write your answer in 100-150
words. Provide an example to support your answer.
Ans A VLAN trunk is an OSI Layer 2 link between two switches that carries traffic for all
VLANs (unless the allowed VLAN list is restricted manually or dynamically). To enable
trunk links, configure the ports on either end of the physical link with parallel sets of
commands.
To configure a switch port on one end of a trunk link, use the switchport mode
trunk command. With this command, the interface changes to permanent trunking mode.
The port enters into a Dynamic Trunking Protocol (DTP) negotiation to convert the link into
a trunk link even if the interface connecting to it does not agree to the change. DTP is
described in the next topic. In this course, the switchport mode trunk command is the only
method implemented for trunk configuration.
The Cisco IOS command syntax to specify a native VLAN (other than VLAN 1) is shown in
Table 3-6. In the example, VLAN 99 is configured as the native VLAN using the switchport
trunk native vlan 99 command.
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
24. How can you create and verify the inter-Vlan route? Write the steps and commands
required to complete this.
1. Ans: Step 1: Create VLANs (VLANs 10 and 20) on the L2 switch.
Description. ...
2. Step 2: Assign the VLANs to the L2 switch ports. ...
3. Step 3: Enable L3 routing and create VLANs (VLANs 10 and 20) on the L3
switch. ...
4. Step 4: Configure Switch VLAN Interfaces (SVI) ...
5. Step 5: Configure a routed port for connecting to the firewall on the L3 switch.
25. What steps do you need to follow to configure Rapid Spanning Tree Protocol on a
network switch?
Ans: Step-by-Step Procedure
1. Configure the VLANs voice-vlan, employee-vlan, guest-vlan, and camera-
vlan: ...
2. Configure the VLANs on the interfaces, including support for the Ethernet
switching protocol: ...
3. Configure the port mode for the interfaces: ...
4. Configure RSTP on the switc
26. List the WHS/OHS Act, Regulation, Code and Regulator enforced in each state and
territory of Australia.
Ans : The model WHS Act forms the basis of the WHS Acts that have been implemented in most
jurisdictions across Australia.
The main object of the Act is to provide for a balanced and nationally consistent framework to
secure the health and safety of workers and workplaces. It does this by:
protecting workers and other persons from harm by requiring duty holders to eliminate or
minimise risk
providing for fair and effective representation, consultation and cooperation
encouraging unions and employer organisations to take a constructive role in promoting
improvements in WHS practices
promoting the provision of advice, information, education and training for WHS
securing compliance with the Act through effective and appropriate compliance and
enforcement measures
ensuring appropriate scrutiny and review of actions taken by persons with powers or
functions under the Act
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Safe Work Australia has published additional documents that complement the model WHS Act:
The explanatory memorandum to the model WHS Act explains how the Act operates.
The Guide to the model WHS Act also provides an overview of the WHS Act and will
help you understand health and safety duties at work.
27. List eight (8) basic utilities used to check network connectivity.
Ans : Network Utilities
PING.
Traceroute.
PathPing.
Nmap.
Netstat.
ARP.
Ipconfig.
Nslookup.
Student’s name:
Question 1
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Question 2
Question 3
Question 4
Question 5
Question 6
Question 7
Question 8
Question 9
Question 10
Question 11
Question 12
Question 13
Question 14
Question 15
Question 16
Question 17
Question 18
Question 19
Question 20
Question 21
Question 22
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J
Question 23
Question 24
Question 25
Question 26
Question 27
Assessor signature:
Assessor name:
Date:
The End
Australian Harbour International College, 114-120 Castlereagh Street, Sydney NSW 2000, Australia
|RTO NO: 41338 | CRICOS Provider Code: 03449J