Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

EVIDENCE PLAN

Competency
Computer Systems Servicing NC II
Standard:

Unit of
SET-UP COMPUTER SERVERS
Competency:
Ways in which evidence will be collected: Assessment
[tick the column] Methods

Demonstration
Examination

Questioning
with Oral
Written
The evidence must show that the trainee…
1. Creates user folder in accordance with network  
operating system (NOS) features *
2. Configures user access based on NOS features and
established network access policies/end-user  
requirements *
3. Performs security check in accordance with established  
network access policies/end-user requirements *
4. Checks Normal functions of server in accordance with 
manufacturer’s instruction *
5. Installs the required modules, add-ons & update based 
on NOS installation procedures *
6. Configures the Network services based on user/system  
requirements *
7. Checks operation of network services based on 
user/system requirements *
8. Responds to unplanned events or conditions with  
established procedures *
9. Undertakes pre-deployment procedures based on  
enterprise policies and procedures *
10. Undertakes operation and security check based on end-  
user requirements *
11. Prepares reports according to enterprise policies and  
procedures *
NOTE: *Critical aspects of competency

PERFORMANCE TEST
SPECIFIC INSTRUCTION FOR THE CANDIDATE
Qualification Computer Systems Servicing NC II

Unit of Competency Set-up Computer Servers

PLEASE READ CAREFULLY:


General Instruction:
Given the necessary tools, materials, and equipment, you need to
demonstrate the following skills listed below. (Allotted time: 5 hours)
 Set-up User Access
 Install Active Directory Services
 Install Dynamic Host Configuration Protocol (DHCP)
 Install File Services
 Install and Configure DNS
 Configure File Resource Manager
 Configure Folder Redirection
 User Account Creation
 Conduct testing and perform file and printer sharing
Specific Instruction:
 Ensure you wear appropriate Personal Protective Equipment.
 Carefully read the general instruction and information sheets.
 After reading the information sheet, answer self-check.
 Perform the performance task, following the steps, procedures and
given tools, materials, and equipment.
 After your demonstration, you will be asked some questions related to
your demonstration and you will have a written examination.
 You may call the trainer when there is a need to translate or explain
items for clarification
 After the questioning portion, you will be given feedback regarding
your performance
 You will be rated using the rating sheet.

RATING SHEET FOR DEMONSTRATION with Oral Questioning


Trainee’s name NORMA LIN
Trainer’s name CHRISTIAN FREDDIE M. PALAPAR
Qualification Computer Systems Servicing NC II
Module Title Setting-up Computer Servers
Date of
July 7, 2024
assessment
Time of
8:00 AM
assessment
Instructions for assessors
1. Provide the trainee with the specific instruction.
2. Observe the trainee perform the task [Use the attached observation
sheet)
3. Place a check mark in the box to show that the trainee completed
each aspect of the activity to the standard expected in the enterprise.
Learning Outcome/Evidence  to show if evidence is demonstrated
Requirements
During the demonstration of
Yes No Comments
skills, the trainee:
 Created user folder in
accordance with network
operating system (NOS)
features
 Configured user access
based on NOS features and
established network access
policies/end-user
requirements
 Performed security check in
accordance with established
network access policies/end-
user requirements
 Checked Normal functions of
server in accordance with
manufacturer’s instruction
 Installed the required
modules, add-ons & update
based on NOS installation
procedures
 Configured the Network
services based on
user/system requirements
 Checked operation of
network services based on
user/system requirements
 Respond to unplanned
events or conditions with
established procedures
 Undertake pre-deployment
procedures based on
enterprise policies and
procedures
QUESTIONING TOOL
Questions to probe the candidate’s underpinning Satisfactory
knowledge Response

Extension/Reflection Questions Yes No


1. Why do you think it is important to regularly check
server backups?
2. You have been assigned to deploy a new Windows Server
that will be used as a file server for a small organization.
Give at least 3 steps would you take to ensure the server
is secure and can handle the expected load of files and
users?
Safety Questions
1. Why do you think is it important to use complex
password in creating user accounts?
2. In some server configurations, why would they
deactivate roles and close the ports that the server is not
using?
Contingency Questions
1. How would you ensure that the server is deployed with
enough safety precautions in relation to malwares and
other unforeseen scenarios?
2. Why should we always update the server contingency
plan regularly?
Job/Role Environment Questions
1. What steps do you take when setting up a new server for
production use?
2. What are some networking protocols and how
are they used in a server environment?
Rules and Regulations
1. How would you ensure that users were created
according to the rules and regulations of server?
2. Should the rules and regulations of the server align with
the organization that is using it? Why?
Answer Key for the Questioning Tool
Extension/Reflection Questions
1. Regularly checking server backups is crucial to ensure data integrity
and availability. In the event of a server failure, having a recent and
verified backup can minimize downtime and data loss.
2. First, I would ensure that the server has the latest Windows Server
updates installed and that it meets the minimum hardware
requirements for the expected workload. Next, I would configure the
server with appropriate security settings, such as disabling unnecessary
services, configuring firewall rules, and enabling antivirus software.
Then, I would create shared folders for the different groups of users and
set appropriate permissions to control access. Finally, I would configure
backups and disaster recovery procedures to ensure that the
organization’s data is protected in case of any unforeseen incidents.
Safety Questions
1. Using complex passwords will help mitigate cyberattacks. Because
compared to a weak password, complex passwords are not easily
exploited. That’s why, if you try to create online accounts, the sites
require a password that has several special characters, numbers and
letters.
2. Deactivating unnecessary services and ports are a good safety practice
on configuring server. It would reduce the risk of server attacks because
open ports are often exploited by several malicious attacks.
Contingency Questions
1. We should be able to mitigate these possible scenarios if we follow the
pre-deployment procedures and practices in relation to server
deployment. Example, configure the firewall, setup security measure on
accounts and users by using complex passwords etc.
2. In deploying servers, a contingency server plan is always necessary. We
need to update the plan regularly because there might be a change in
system or workflow, so in order for the server to cope up, we need to
update the configurations inside the server.
Job/Role Questions
1. In setting up new servers, you need to have a lot of technical knowledge
and attention to detail. You should know how to configure the system
and ensure tests to make sure everything is working.
2. You’ll need to understand how different protocols are used in a server
environment, and how to configure them to ensure maximum
performance.
Rules and Regulation
1. By following the suggested rules and regulations when creating new
users which depends on the organization where the server is deployed.
2. Yes, because a server will cater the needs of a specific organization that
it serves. So it should align with its policies to ensure smooth process.
TABLE OF SPECIFICATIONS
# of
Objectives/Content/
Knowledge Comprehension Application items/%
Area/Topic
of test
1. Create user folder in
accordance with network
2 2 1
5
operating system (NOS) (item 1,2) (item 3,4) (item 5)
features
2. Configure user access
based on NOS features 2 2 1
and established network 5
access policies/end-user (item 6,7) (item 8,9) (item 10)
requirements
3. Perform security check
in accordance with 1 2 1
established network 4
access policies/end-user (item 11) (item 12,13) (item 14)
requirements
4. Configure the Network
1 1
services based on 2
user/system (item 15) (item 16)
requirements
3
5. Respond to unplanned
events or conditions with (item 17, 3
established procedures * 18,19)
6. Undertake pre-
deployment procedures
1 1
2
based on enterprise (item 20) (item 21)
policies and procedures *
7. Undertake operation
and security check based
1 2
2
on end-user (item 22) (item 23,24)
requirements *
8. Prepare reports 1
according to enterprise 1
policies and procedures * (item 25)
INSTITUTIONAL WRITTEN EXAMINATION

Name: _____________________________________

Multiple Choice: Read the questions carefully. Write the letter


of the best answer to each question on the answer sheet.

1. What tools can you use to install the Active Directory Role?
a. Server Manager and Windows PowerShell
b. Control Panel and Command Prompt
c. Disk Management and Device Manager
d. Task Manager and Event Viewer

2. What is the primary role of a Domain Controller in a Windows


Server environment?
a. To manage network resources
b. To provide a web server platform
c. To store user account information and process login
requests
d. To manage print jobs

3. What server role is required to install and configure Active


Directory?
a. File and Storage Services
b. Web Server (IIS)
c. DNS Server
d. DHCP Server

4. Which of the following is not a role in Windows Server?


a. DHCP Server
b. DNS Server
c. File and Storage Services
d. Microsoft Office Suite
5. What is the purpose of the Active Directory in Windows Server?
a. To provide a web server platform
b. To manage network resources
c. To manage print jobs
d. To store information about objects on the network and
make this information easy for administrators and users
to find and use

6. Which of the following is not an object in ADDS?


a. a) User
b. b) Group
c. c) Computer
d. d) Printer
7. What is the purpose of a User object in ADDS?
a. a) To represent a user on the network
b. b) To check the server logs
c. c) To prevent data loss in case of hardware failure or other
disasters
d. d) To update the server software

8. What is the primary function of the DNS Server role in


Windows Server?
a. a) To manage network resources
b. b) To translate domain names into IP addresses
c. c) To manage print jobs
d. d) To provide a web server platform

9. What is the primary purpose of the DHCP Server role in


Windows Server?
a. To manage network resources
b. b) To provide a web server platform
c. c) To assign IP addresses to computers on the network
d. d) To manage print jobs

10. An unidentified user is trying to access your server. You


notice this because the user is making multiple failed attempts
to log in. What should you do?
a. Ignore the situation since the user is not able to log in.
b. Immediately block the IP address of the user.
c. Monitor the situation and gather more information about
the user.
d. Inform your supervisor and ask for guidance.
11.What is the primary function of the File and Storage Services
role in Windows Server?
a. a) To manage network resources
b. b) To provide a platform for sharing files and folders on
the network
c. c) To manage print jobs
d. d) To provide a web server platform
12. What is the primary purpose of the Windows Server Update
Services role in Windows Server?
a. a) To manage network resources
b. b) To provide a web server platform
c. c) To manage print jobs
d. d) To manage the distribution of updates released through
Microsoft Update to computers in a corporate
environment

13. What is the primary purpose of user access control in a server


environment?
a. a) To delete all the data on the server
b. b) To check the server logs
c. c) To prevent unauthorized access to the server
d. d) To update the server software

14. What is the purpose of a firewall in a server environment?


a. a) To manage network resources
b. b) To provide a web server platform
c. c) To control incoming and outgoing network traffic based
on predetermined security rules
d. d) To manage print jobs

15. Which of the following is not a role in Windows Server?


a. a) DHCP Server
b. b) DNS Server
c. c) File and Storage Services
d. d) Microsoft Office Suite

16. What would happen if the two computers you are trying to
network have the same IP address?
a. Conflicting IP address for them.
b. It will immediately join the network.
c. Automatic file and folder sharing will be enabled.
d. The network will refuse the additional computer.
17. You are the server administrator for a company. One day, you
receive multiple reports from users that they are unable to
access the company’s internal website. You didn’t schedule any
maintenance or changes. What should you do?
a. Ignore the reports since you didn’t make any changes to
the server.
b. Restart the server immediately.
c. Check the server logs and status to identify any issues.
d. Inform the users that the website is down and they
should try again later.
18. If you suspect a cable issue, which tool would you use to test
the connection?
a. Ping
b. Cable tester
c. Traceroute
d. Netstat
19. John and Vincent are trying to connect their computers; they
use the following:
IP address: 192.168.5.4 and 192.168.4.5. Is John and
Vincent’s IP address correct?
a. Yes, given that their IP address is unique
b. Yes, because they put an IP address in each PC
c. No, the second octet is identical
d. No, because the third octet is different
20. What is the first step in the server maintenance process?
a. a) Checking server logs
b. b) Updating the server software
c. c) Backing up the server data
d. d) Restarting the server
21. What is the purpose of backing up the server data during
server maintenance?
a. a) To delete all the data on the server
b. b) To check the server logs
c. c) To prevent data loss in case of hardware failure or other
disasters
d. d) To update the server software

22. Which of the following is not a common server maintenance


task?
a. a) Checking server logs
b. b) Updating the server software
c. c) Installing new hardware components
d. d) Deleting all the data on the server
23. Why is it important to regularly update the server software?
a. a) To delete all the data on the server
b. b) To ensure that the server has the latest security
patches and bug fixes
c. c) To check the server logs
d. d) To backup the server data

24. What is the purpose of backing up the server data during


server maintenance?
a. a) To delete all the data on the server
b. b) To check the server logs
c. c) To prevent data loss in case of hardware failure or other
disasters
d. d) To update the server software

25. What is the purpose of checking server logs during server


maintenance?
a. a) To identify any errors or issues that may have occurred
b. b) To update the server software
c. c) To backup the server data
d. d) To restart the server
Answer Key to Institutional Examination
1. A
2. C
3. C
4. D
5. D
6. D
7. A
8. B
9. C
10. C
11. B
12. D
13. C
14. C
15. D
16. A
17. C
18. A
19. D
20. C
21. C
22. D
23. B
24. C
25. A

You might also like