Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 13

ASSESSMENT RECORD / FEEDBACK SHEET

Course: ICT60215 Advanced Diploma of Network Security

Name:

Unit Name and Code: ICTNWK604 Plan and configure advanced internetwork switching
solutions

Assessment Task Number and Title: 9 Short Answer Questions

Date Submitted: 19/November /2020 Trainer’s Name

 All assessments must be in a neat and readable format.


 Students are required to retain a duplicate of any assignment submitted, both written & disk
copy.
 Please refer to the Student Handbook for the Assessment Policy.
 Plagiarism is an academic misconduct and is unacceptable to Pacific College of Technology.
 I certify that the work submitted is my own. I have acknowledged material taken from
websites, textbooks and articles.

To be completed by Trainer

Competent Not yet competent to be reassessed

Feedback

Signed (Trainer/Assessor) Date:

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 1 of 13
Course : ICT60215 Advanced Diploma of Network Security
Unit Code and Name : ICTNWK604 Plan and configure advanced internetwork switching
solutions
Trainer/Assessor :
Assessment item : 9 -SAQ
Due date : Week 8 (Extension upon trainer’s approval only)

Context and Purpose of the assessment:

This assessment will assess your skills and knowledge in the area of ‘ICTNWK604 Plan and
configure advanced internetwork switching solutions’ unit. This assessment activity deals
with the following elements of performance and critical aspects of evidence:

Question Element Performance Criteria


1-15 1, 2, 3, 4 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.4, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7,
3.8, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6

o The assessment tasks for the unit assume that you will work in the Information Technology
industry. Short answer question used in this assessment reflect a workplace scenario.

o The student must have access to a computer, printer and Microsoft office suite applications
and Cisco’s Packet Tracer for doing the assessment for this unit.

o If you are not sure about any aspect of this assessment, please ask for clarification from your
trainer. If the assessment is not satisfactory, the trainer will allow one more attempt to the
assessment item.

o The responses to assessment questions should be in your own words and examples from
workplace should be used wherever possible.

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 2 of 13
Short answer question

Read each of the questions and, using the information provided to you in addition to

personal research, Provide at least 4-5 sentences in response to each of the questions.

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 3 of 13
1. Explain the benefits of formal or structured approach to network management
Answer:
The benefit of formal approach to network management is it provides teamwork between
different teams.
 It consists of a common structure if network involves an organization. This will let
different teams to work together on problems in a repeatable way
 It brings additional resources into a situation ownership of problems will be handed
between teams in hierarchical or functional escalation.in structural approach, external
resources may be brought into assist with the problem. This will allow individuals to
quickly get an appraised of the situation and understand the progress that has already
being made.
 It gives common language for the problem solvers. Structured problem analysis
techniques have their own technology. Having shared understanding of problem area,
root cause and probable cause, will prevent miss-understanding and confusion during
critical moments.
 Compared to informed method, it can be favourable since it saves time, easy
maintenance and not much complex i.e. easy to understand compared to tradition
approaches

2. Summarise business justifications for having integrated and unified enterprise networks
Answer:
Unified enterprise networks involves wired networks and unwired networks. The following
are justifications unified and integrated networks in a business.

 Central management is one of the most evident benefits is having a central point of
command, over the entire network. Central management is a wireless management
software which provide a dynamic reporting and troubleshooting to offer you real time
network optimization analytics.
 Less complicated Network created is simpler and more effective by implementing an
infrastructure that eliminates the need for disparate wired and wireless networks and their
accompanying security policies.
 Better cost efficient the cost of implementation and maintenance is low compared to
traditional network. It is also less costly to update to an every new technology update.
 Easy implementation of new devices may come up day to day, which have different
network configuration. Using unified network it is easy to add a device into network.

3. Outline current wireless regulations, standards and certifications


Answer:

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 4 of 13
Wireless regulatory bodies, standards and certifications (FCC, ETSI, 802.11a/b/g/n, WiFi
Alliance)
 FCC & ETSI - Each country defines its rules about the use of the RF space including the
following rules:
- Which frequencies are allowed (spectrum & channels)
- Which transmit power are possible (transmitted and antennae gain and EIRP)
- Haw a wave can be sent in each frequency ( modulation and encoding techniques)
 Wifi Alliance is certifies interoperability between products WLAN product. It is typical
in core networks to find multiple single-vendor platforms whose integration has largely
been achieved as part of product testing by the vendor.
 802.11a it ratified as standard in September 1999 and has a speed of 54Mb/s
GHz(OFDM)
 802.11b approved for use nearly worldwide and it is not recommended for new
deployments. It has a 11 Mb/s,2.4 GHz, DSSS.
 802.11g has a speed of 54Mb/s, 48 Mb/s and it includes 802.11b data rates.
 802.11n the goal for this software upgrades is to meet standard compliance and minimize
hardware.

4. Clarify emerging viable business and social technologies


Answer:
 Al is the new UI, artificial intelligence is becoming the new user interface ,
supporting the way we transact and interact with system.
 Design for human, technology adapts to how we perform and acquires from us to
improve out lives
 Workplace marketplace the amount of on-demand labour platforms and online work-
management solutions is surging. As a result, leading companies are dissolving
traditional orders and changing them with talent marketplaces.
 The uncharted Instead of concentrating only on introducing new products and
services, they should think much bigger – seizing opportunities to establish rules and
standards for entirely new industries.

5. Explain external developments or factors that affect switched network design


Answer:
Network performance is about response time - how fast a message can be sent or how
quickly a document can be retrieved. The performance of a network can be affected by
various factors:

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 5 of 13
- the number of devices on the network
- the bandwidth of the transmission medium
- the type of network traffic
- network latency
- the number of transmission errors

6. Summarise maintenance and management tools and practices suitable for complex
networks to achieve availability and resilience
Answer:
 Managing Period Maintenance – you need to follow periodic maintenance task,
because if you don’t manage them, they won’t get done or won’t get done fairly
regularly. You can built a tracking spread sheet, with task and when last perform to
help you to manage your task.
 Network high availability testing - This might be done annually or every two years,
depending on how often you’ve been burned by failure of failover to work.
 Configuration Backup/Change Control This enables config comparison when there’s
an outage, for “what changed?” – quite often the first question asked in
troubleshooting
 Network Device Inventory synch your config management device inventory, and that
in other network management tools to the “master” inventory. If you have auto
discovery turned on, which you should, then the tools may catch devices you forgot to
add to your inventory.
 Cached Information includes (a) good diagrams, and (b) having your router names in
DNS and use short device names following a structured naming convention.
 Automated Configuration Compliance Checking Applied to configuration
compliance: configurations drift over time — people can be inconsistent or mess up.

7. Outline network topologies and explain their features with diagram.


Answer:
Network topology refers to how various nodes, devices, and connections on your network are
physically or logically arranged in relation to each other.

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 6 of 13
Network Topology Diagram
Bus Topology All data transmitted between
nodes in the network is transmitted over this
common transmission medium and is able to
be received by all nodes in the network
simultaneously.

Ring Topology is where nodes are arranged


in a circle. it involves to peer to peer lan
topology nodes it means there is no one in
superior in the network and there is no one
inferior in this networks all nodes are with
equal rights and this is the reason why the
call these node to peer to peers nodes.

Star Topology: is a common network


topology, is laid out so every node in the
network is directly connected to one central
hub via coaxial, twisted-pair, or fiber-optic
cable. Every nodes is connected to a central
nodes call hub or switch.

Mesh Topology each node is directly


connected to every other node in the
networks. It is an intricate and elaborate
structure of point-to-point connections
where the nodes are interconnected

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 7 of 13
Hybrid topology is a combination of two or
more topology. A combination of star
and mesh topology is one of the good
example of hybrid.

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 8 of 13
8. Explain organisational policies for internetworking
Answer:
Internetworking infrastructures in the organisation are setup to share information within the
organisation. Organisations having internetworking infrastructure should provide a reliable
and secure IT services to their users. A secure network can be provided by using good
software and hardware devices. IP addresses should be secure and should not be released to
anyone outside to the organisation.
Internetworking provides a great benefit to organisations. This organisation can share their
information within or outside to other organisation with ease and effective way.

9. Summarise risk management strategies and practices suitable for a complex switched
network environment
Answer:
In planning an overall strategy for security architecture design, sound principles are needed
to accomplish an effective security posture. The selective combination of these principles
provides the fundamentals for threat mitigation within the context of a security policy and
risk management.

 Defense in depth: This is an umbrella term that encompasses many of the other guidelines
in this list. It is defined by architectures based on end-to-end security, using a layered
approach. The objective is to create security domains and separate them by different
types of security controls. The concept also defines redundancy of controls, where the
failure of one layer is mitigated by the existence of other layers of controls.
 Compartmentalization: Creating security domains is crucial. Different assets with
different values should reside in different security domains, be it physically or logically.
Granular trust relationships between compartments would mitigate attacks that try to gain
a foothold in lower-security domains to exploit high-value assets in higher-security
domains.
 Least privilege: This principle applies a need-to-know approach to trust relationships
between security domains. The idea, which originated in military and intelligence
operations, is that if fewer people know about certain information, the risk of
unauthorized access is diminished. In network security, this results in restrictive policies,
where access to and from a security domain is allowed only for the required users,
application, or network traffic. Everything else is denied by default.
 Weakest link: This is a fundamental concept—a security system is as effective as its
weakest link. A layered approach to security, with weaker or less protected assets
residing in separated security domains, mitigates the necessary existence of these weakest
links. Humans are often considered to be the weakest link in information security
architectures.

10. Outline security for an enterprise-switched environment


Answer:

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 9 of 13
Security is another major responsibility of enterprise network administrators. Perimeter
firewalls and internal firewalls are designed to secure apps and data from outside attacks,
 Threats in networks
 Network security control
 Firewall
 Intrusion dectection system
 Secure email
 Networks and Cryptography

11. Explain security standards and technologies for switched network environments
Answer:
A security standard is like any other standard within any other industry. A standard is “a
published specification that establishes a common language, and contains a technical
specification or other precise criteria and is designed to be used consistently, as a rule, a
guideline, or a definition”. Further, according to ISO, standards “contribute to making life
simpler, and to increasing the reliability and effectiveness of the goods and services we use”.

12. Summarise switching and routing technologies for an enterprise-switched environment.


Answer:
A network switch is a destablishing device that is used to join devices together on a machine
system, by using a manifestation of bundle switching to forward information to the end
devices. A system switch is viewed as more developed than a centre point in light of the fact
that a switch will just forward a message to one or different gadgets that need to get it, as
opposed to TV the same message out of each of its ports.
A system switch is a multi-port system connects advances information at the information
connection (layer 2) of the OSI model. Switches can likewise consolidate directing
notwithstanding crossing over; these switches are generally known aslayer-3 or multilayer
switches. Switches exist for different sorts of systems including Fiber Channel,
Asynchronous Transfer Mode, Ethernet and others

13. Provide at least 5 networking tools with their functions and pictures.
Answer:

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 10 of 13
Coaxial cable is a cable that includes the
outer metal that does the conducting.

Wire Crimper is use in order to connect


RJ-45 and other connector to the end
of the cable. It is a connectors to
twisted pair cable so after you have
inserted the wires into the rj-45
connector you just place it into the
crimper give it a squeeze and then the
cable is done.

Cable Tester is a device that is used to


verify the continuity and if the wires
are arrange correctly so you would just
connect both ends of the cable into the
tester and then it will cycle through all
the pins in the cable to make sure that
the cable is properly wired and
connected.

Tone generator & Probe is use to connect


at one end of te cable that you want to
isolate and then it would generate a
tone through the cable all the way to
the other en and then with the proe you
would just jump from cable to cable
on the patch panel until you find the
cable then one the probe detects the
tone comping from the cabe the probe
will generate asound indicating that it
has found the cable.

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 11 of 13
Time Domain Reflectometer is a piece of
electronic equipment that is used to
test cable such as twisted pair and
coaxial cable and this is done by
transmitting a signal through the cable
and then the signal is reflected back to
the tdr, the tdr then analyzes the
reflected signal and from there its able
to pinpoint if there are any problems
and theses problemss could be
conductors loose connectors shorts
crimps bend and so on.

14. Differentiate between Access Point and Extender.


Answer:
Access point is a wireless networking device that allows wireless devices and networks to
connect through a wired network using wireless technologies such as Wi-Fi. It relat data
between a wired network and wireless devices, access point connects directly to an
organization router where the router is then connected directly to the modem
Extender is wireless networking devices used to extend the coverage are of your wireless
network.

15. What do you understand by the term VOIP?


Answer:
Voice over Internet Protocol or VOIP is technologies that improve the way we
communicate, basically means voice transmitted over a digital network. VOIP is taking
telephone conversation routing them through a phone over a network cable into the
network and then out to the internet. A good example of VOIP such as Viber, Skype,
wattsapp, messenger etc.

Bibliography
5 Important Advantages of Formal Organisation in
Businesshttps://www.yourarticlelibrary.com/organization/5-important-advantages-of-
formal-organisation-in-business/952
5 New Technologies You Should Integrate Into Your
Businesshttps://www.forbes.com/sites/ilyapozin/2015/10/15/5-emerging-technologies-
you-need-to-know-about-for-your-enterprise/?sh=5eda996976aa
7 factors to consider in network redundancy
designhttps://searchnetworking.techtarget.com/tip/7-factors-to-consider-in-network-
redundancy-design
An Overview of Information Security Standardshttps://bhconsulting.ie/an-overview-of-
information-security-standards/?fbclid=IwAR2AeQSEqX4-

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 12 of 13
He4F3SbbAcVHlAogRt87ze03eqfc_Z6Gpo7whmZrUMINahQ#:~:text=A%20security
%20standard%20is%20like,guideline%2C%20or%20a%20definition%E2%80%9D
Network Management System: Best Practices White
Paperhttps://www.cisco.com/c/en/us/support/docs/availability/high-availability/15114-
NMS-bestpractice.html
Network Switching Tutorialhttps://www.lantronix.com/resources/networking-tutorials/network-
switching-tutorial/
Network Tools and Their Purposehttps://www.cmple.com/learn/network-tools-and-their-
purpose#:~:text=Computer%20networks%20are%20used%20to,facilitate%20a
%20transfer%20of%20data.
Security in Nsetworkinghttps://slideplayer.com/amp/9435519/?fbclid=IwAR031KpRO-
FpXUaQx5MY3GjvJMGc_sSym5QaNhG_6rK668hWuys0PIv-TPE
Understanding What VoIP
Meanshttps://www.dummies.com/education/internet-basics/understanding-what-voip-
means/
What Is Network Topology? Best Guide to Types and Diagramshttps://www.dnsstuff.com/what-
is-network-topology
WHAT IS THE DIFFERENCE BETWEEN WIRELESS ACCESS POINTS, MESH NETWORKS
AND NETWORK EXTENDERS?https://www.jimsantennas.com.au/2020/08/14/what-is-
the-difference-between-wireless-access-points-mesh-networks-and-network-extenders/
Wireless Fundamentalshttps://slideplayer.com/slide/4679953/

DS-SP-09/20 SAQ-ICTNWK604 V2.1


RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 13 of 13

You might also like