Professional Documents
Culture Documents
ICTNWK604 Assessment 9
ICTNWK604 Assessment 9
Name:
Unit Name and Code: ICTNWK604 Plan and configure advanced internetwork switching
solutions
To be completed by Trainer
Feedback
This assessment will assess your skills and knowledge in the area of ‘ICTNWK604 Plan and
configure advanced internetwork switching solutions’ unit. This assessment activity deals
with the following elements of performance and critical aspects of evidence:
o The assessment tasks for the unit assume that you will work in the Information Technology
industry. Short answer question used in this assessment reflect a workplace scenario.
o The student must have access to a computer, printer and Microsoft office suite applications
and Cisco’s Packet Tracer for doing the assessment for this unit.
o If you are not sure about any aspect of this assessment, please ask for clarification from your
trainer. If the assessment is not satisfactory, the trainer will allow one more attempt to the
assessment item.
o The responses to assessment questions should be in your own words and examples from
workplace should be used wherever possible.
Read each of the questions and, using the information provided to you in addition to
personal research, Provide at least 4-5 sentences in response to each of the questions.
2. Summarise business justifications for having integrated and unified enterprise networks
Answer:
Unified enterprise networks involves wired networks and unwired networks. The following
are justifications unified and integrated networks in a business.
Central management is one of the most evident benefits is having a central point of
command, over the entire network. Central management is a wireless management
software which provide a dynamic reporting and troubleshooting to offer you real time
network optimization analytics.
Less complicated Network created is simpler and more effective by implementing an
infrastructure that eliminates the need for disparate wired and wireless networks and their
accompanying security policies.
Better cost efficient the cost of implementation and maintenance is low compared to
traditional network. It is also less costly to update to an every new technology update.
Easy implementation of new devices may come up day to day, which have different
network configuration. Using unified network it is easy to add a device into network.
6. Summarise maintenance and management tools and practices suitable for complex
networks to achieve availability and resilience
Answer:
Managing Period Maintenance – you need to follow periodic maintenance task,
because if you don’t manage them, they won’t get done or won’t get done fairly
regularly. You can built a tracking spread sheet, with task and when last perform to
help you to manage your task.
Network high availability testing - This might be done annually or every two years,
depending on how often you’ve been burned by failure of failover to work.
Configuration Backup/Change Control This enables config comparison when there’s
an outage, for “what changed?” – quite often the first question asked in
troubleshooting
Network Device Inventory synch your config management device inventory, and that
in other network management tools to the “master” inventory. If you have auto
discovery turned on, which you should, then the tools may catch devices you forgot to
add to your inventory.
Cached Information includes (a) good diagrams, and (b) having your router names in
DNS and use short device names following a structured naming convention.
Automated Configuration Compliance Checking Applied to configuration
compliance: configurations drift over time — people can be inconsistent or mess up.
9. Summarise risk management strategies and practices suitable for a complex switched
network environment
Answer:
In planning an overall strategy for security architecture design, sound principles are needed
to accomplish an effective security posture. The selective combination of these principles
provides the fundamentals for threat mitigation within the context of a security policy and
risk management.
Defense in depth: This is an umbrella term that encompasses many of the other guidelines
in this list. It is defined by architectures based on end-to-end security, using a layered
approach. The objective is to create security domains and separate them by different
types of security controls. The concept also defines redundancy of controls, where the
failure of one layer is mitigated by the existence of other layers of controls.
Compartmentalization: Creating security domains is crucial. Different assets with
different values should reside in different security domains, be it physically or logically.
Granular trust relationships between compartments would mitigate attacks that try to gain
a foothold in lower-security domains to exploit high-value assets in higher-security
domains.
Least privilege: This principle applies a need-to-know approach to trust relationships
between security domains. The idea, which originated in military and intelligence
operations, is that if fewer people know about certain information, the risk of
unauthorized access is diminished. In network security, this results in restrictive policies,
where access to and from a security domain is allowed only for the required users,
application, or network traffic. Everything else is denied by default.
Weakest link: This is a fundamental concept—a security system is as effective as its
weakest link. A layered approach to security, with weaker or less protected assets
residing in separated security domains, mitigates the necessary existence of these weakest
links. Humans are often considered to be the weakest link in information security
architectures.
11. Explain security standards and technologies for switched network environments
Answer:
A security standard is like any other standard within any other industry. A standard is “a
published specification that establishes a common language, and contains a technical
specification or other precise criteria and is designed to be used consistently, as a rule, a
guideline, or a definition”. Further, according to ISO, standards “contribute to making life
simpler, and to increasing the reliability and effectiveness of the goods and services we use”.
13. Provide at least 5 networking tools with their functions and pictures.
Answer:
Bibliography
5 Important Advantages of Formal Organisation in
Businesshttps://www.yourarticlelibrary.com/organization/5-important-advantages-of-
formal-organisation-in-business/952
5 New Technologies You Should Integrate Into Your
Businesshttps://www.forbes.com/sites/ilyapozin/2015/10/15/5-emerging-technologies-
you-need-to-know-about-for-your-enterprise/?sh=5eda996976aa
7 factors to consider in network redundancy
designhttps://searchnetworking.techtarget.com/tip/7-factors-to-consider-in-network-
redundancy-design
An Overview of Information Security Standardshttps://bhconsulting.ie/an-overview-of-
information-security-standards/?fbclid=IwAR2AeQSEqX4-