Professional Documents
Culture Documents
Term 2 Assessment Guide
Term 2 Assessment Guide
Term 2 Assessment Guide
When quoting or paraphrasing from a source such as the Internet, the source must
be recognised. If you are quoting a source, make sure to acknowledge this by
including “quotation marks” around the relevant words/sentences or ideas. Note the
source at the point at which it is included within your assessment, such as by using a
citation. Then list the full details of the source in a ‘references’ section at the end of
your assessment.
All sources used for your assessment should be detailed in a ‘references’ section. It
is advisable to never copy another person’s work.
Email: Yusufkara87@gmail.com
Trainer / Assessor
Abdullah Mamun
Name:
Date
Due Date:
Submitted:
Declaration: I have read and understood the following information at the
beginning of this assessment guide (please tick):
☐ Assessment information
☐ Submitting assessments
☐ Plagiarism and referencing
I declare this assessment is my own work and where the work is
of others, I have fully referenced that material.
Candidate signature:
Date:
Questions
A.1 Research and identify emerging technology information sources
Learning resources: online research, government website, trusted information
sources
Answer:
Answer:
A.3 Discuss Network topology ? Why is network topology important ? What’s the
most common type of Network Topology? (150 - 200 words)
Learning resources:
https://www.dnsstuff.com/what-is-network-topology#:~:text=Network%20topology
%20is%20the%20way,in%20certain%20circumstances%20than%20others.
Answer:
A.4 Briefly discuss Network Protocols and security solutions (80-100 words)
Learning resources:
https://ipwithease.com/ip-addressing-scheme-ipv4/
https://www.ibm.com/docs/en/aix/7.2?topic=protocol-tcpip-addressing
Answer:
Network protocols are a set of rules and conventions that enable devices to
communicate and exchange data over a computer network. Network security
solutions are measures and technologies such as firewalls, network
segmentation, antivirus and antimalware softwares, encryption which
designed to protect computer networks and data from unauthorized access,
attacks, and vulnerabilities.
Answer:
Physical Layer (Layer 1):The Physical Layer deals with the physical
connection and transmission of data over the network medium.
Data Link Layer (Layer 2):The Data Link Layer provides error-free and
reliable data transmission between two directly connected nodes over the
Physical Layer.
Network Layer (Layer 3):The Network Layer is responsible for routing data
packets between different networks to reach their destination.
Transport Layer (Layer 4):The Transport Layer ensures reliable and end-to-
Application Layer (Layer 7):The Application Layer is the topmost layer and
interacts directly with end-user applications.
A.6 How does transmission control protocol works ? Briefly discuss the layers of
TCP/IP models (100-150 Words)
Learning resources:
https://www.fortinet.com/resources/cyberglossary/tcp- ip#:~:text=What%20is
%20TCP%3F,data%20and%20messages%20over%20net works.
Answer:
A.7 What are the seven layers of Open System Interconnection (OSI) of
networking? (100 - 150 Words)
Learning resources:
https://www.cloudflare.com/en-gb/learning/ddos/glossary/open-systems-
interconnection-model-osi/
Answer:
A8. What is the purpose of WAN connection? How does a WAN works? (100 - 150
Words)
Learning resources:
https://aws.amazon.com/what is/wan/#:~:text=A%20wide%2Darea%20network
%20(WAN,area%2C%20or%20even%20the%20world.
Answer:
A9. Research and list some hardware and software tools that can be used to
troubleshoot network issues.
Learning resources:
https://aws.amazon.com/what is/wan/#:~:text=A%20wide%2Darea%20network
%20(WAN,area%2C%20or%20even%20the%20world.
Answer:
Some common hardware tools used for network troubleshooting are network
cable tester, loopback plug, ethernet cable crimper, network tap (test access
point), multimeter, wireless signal analyser. To troubleshoot network issues
effectively, network administrators and IT professionals use a combination of
software tools such as network protocol analyzer, ip scanner, port scanner,
command-line network diagnostics, ping, traceroute.
Answer:
Case Study 1
Task B- Define business requirements – Documentation &
Consultation
This task demonstrates that you are able to research the IT requirements of a
business. Review the Sydney Institute of Technology policies and provide the
following information.
You have to write a report that details the information about the requirements of the
proposed system. Your report should have the following sections.
Outline the contents and purpose of the report.
Limitations and operational issues of the current IT system
Research and recommend three emerging technologies and practices for Sydney
Institute of Technology (SIT)
Discuss potential opportunities and threats resulting from the emerging
technology and practice
Likely impact on current organisational technologies and practices
Objectives of the organisation in responding to the emerging technology or
practice
Changes required in order to achieve intended objectives of the organisation
Develop a change management plan for SIT
Develop an Action plan to implement the changes required
Analyse the existing IT infrastructure. Compare and contrast the existing system
with recommended system
Research on vendor sites for installation requirements and procedures
Submission requirements:
Report with action plan in word or PDF format
Change management plan
Recorded Meeting in mp4 format
Meeting link:
Submission requirements:
Screenshots
Submission requirements:
Screenshots
This task allows you to demonstrate your ability to install and configure Active
Directory server roles.
Submission requirement:
Screenshots
D2. DNS
This task allows you to demonstrate your ability to install and configure DNS roles.
Submission requirement:
Screenshots
D3. DHCP
This task allows you to demonstrate your ability to install and configure DHCP roles.
Submission requirement:
Screenshots
NOTE: Use CISCO packet tracer to complete the required assessment activities.
Submission requirements:
Screenshots
Submission requirements:
Screenshots
Submission requirements:
Screenshots
1.A technical system specification of the actual server outlining the hardware
configuration and drivers used. Include serial numbers for major components.
Submission requirements:
Copy of the user documentation
This task allows you to demonstrate your ability to test and ensure that installed OS
and network equipment are working according to the requirements. Use the test
template to document the test results.
Submission requirements:
Copy of the Test documentation
You are to organise training sessions for SIT management and staff members. Use
the training template to complete the task.
Submission requirements:
Copy of the training plan
This task allows you to document the server’s configuration. You need to prepare a
document called a Systems Handover Technical Reference that has the following
sections.
1.Identify the expected role of the server.
2.Provide technical system information outlining hardware configuration.
3.Identify the disk and directory information including share points.
4.Outline security groups
5.Outline system backup procedures
6. In a meeting discuss the new system with SIT principal John Steven. Incorporate
any feedback in the document and obtain sign off
Submission requirements:
Copy of the technical documentation
Meeting link
Case Study 2
Task F - Install Operating System Software
By completing you can demonstrate your ability to install an operating system which
meets the specifications of a business. In this task you will install a server and a
client on separate computers.
You need to do:
Install the Windows Server operating system recommended by your
trainer and related services that follow the specifications you identified for
case study 2.
Use another machine/device, install the Windows 10 operating system
and related services for a client.
Install Norton’s Antivirus (or similar) to the client PC
Test the domain installation by logging on as administrator on the client
computer and join the server’s domain.
Submission requirements:
Screenshots
Submission requirements:
Screenshots
This task allows you to demonstrate your ability to install and configure Active
Directory server roles.
Submission requirement:
Screenshots
This task allows you to demonstrate your ability to install and configure DNS roles.
Submission requirement:
Screenshots
This task allows you to demonstrate your ability to install and configure DHCP roles.
Submission requirement:
Screenshots
Research and identify level of support required for each department at NBC
Lawyers.
Submission requirements:
H1.Test the DHCP functionality for NBC server using the windows commandline
Answer:
Answer:
H3. Test the host connection using the ping command. Submit screenshot of the
result
Answer:
H5. Write the command to show paths a packet of information takes from your
computer to one you specify.
Answer:
H6.You are working as a network administrator at NBC Lawyers. You receive a call
from one of the staff member who does not have an internet connection. It seems
that his wireless router is working, but is not getting any internet connection.
Research what kind of network or hardware problems he might have and note the
possible solutions to this problem
Answer: