Install and manage complex ICT networks
1.
Describe two typical firewall configurations and how these configurations can be applied to securing a network.
2.
Define the purpose of network time protocol (NTP) in a network.
3.
Define the purpose of server messages block (SMB) in a network. List (i) two resources that can be shared with SMB and (ii) two operating systems that support the SMB protocol.
4.
Define the roles of the following protocols in email systems (i) SMTP (ii) IMAP.
5.
Define the purpose of (i) a forward proxy server and (ii) a reverse proxy server in a network.
6.
Define the purpose of the following types of HTTP Requests to a web server: (i) GET (ii) POST.
7.
Describe what is meant by network service management as it applies to (i) quality of service and (ii) availability measures in a network.
8.
Identify two network diagnostic utilities, and describe how they could be used in troubleshooting a connectivity problem.
9.
Describe the purpose of user authentication and directory services in a network.
10.
Describe the purpose of voice over internet protocol (VoIP), and give an example of how it could be used in a network to lower telephone costs.
11.
Describe the basic concept of a site-to-site virtual private network (VPN) and give an example of how it could be used to securely connect two network locations.
12.
Define the purpose of the following IP-related configuration parameters:
a. IP Address
. Subnet mask
c. Default gateway
13.
Describe the basic concept of a remote access virtual private network, and give an example of how it could be used to securely connect to a network across the internet.
14.
You are attempting to integrate two sites (Melbourne and Geelong) by implementing a site-to-site VPN between the two locations. The protocol you implement between the two sites is IPSec which requires a shared secret to be configured at each VPN end point, and you configure the shared secret “MySecret” at the Melbourne VPN end point only. When you try to connect the VPN from Melbourne to Geelong, the connection fails, with the Geelong VPN end point reporting is is unable to decrypt the date. What is the problem, and how can you rectify it?
15.
You add a new printer to an existing IPv4 network that supports both IPV6 and IPv4 addressing, but you only configure an IPv6 address for the device. When you power on the printer to test it’s connectivity to the rest of the network, you get a message “unable to connect to network”. . What is the problem, and how can you rectify it?
16.
List the type of unshielded twisted pair (UTP) cables I would need to install to support the following types of connections (i) 1 Gb Ethernet (ii) 10Gb Ethernet.
17.
Give two examples of types of hardware that would be found in a network infrastructure.
18.
Describe how load balancing can be used in the deployment of web applications.
19.
Give two examples of security measures that can be taken to improve network security.
20.
List two examples of server operating systems commonly used in industry today.
21.
Define the purpose of domain name system (DNS) in a network. What is role of (i) AAAA records and (ii) MX records in DNS?
22.
Define the purpose of dynamic host configuration protocol (DHCP) in a network. What is meant by (i) a DHCP scope and (ii) a DHCP exclusion?
23.
Define the purpose of file transfer protocol (FTP) in a network. What are the FTP commands to (i) list all files in a directory and (ii) get a file from a FTP server onto an FTP client?
Manage IP, ethics and privacy in ICT environments
1.
In context of the Australian Computer Society Code of Ethics, explain your responsiblies for the following values:
a. The Primacy of the Public Interest
. Professional Development
Write your answer in XXXXXXXXXXwords.
2.
Explain the processes that an organisation can use to communicate its policies and procedures to its employees? Write 30-50 words for each communication method.
3.
Answer the following:
a. Explain the purpose of organisational standards for customer service. Write your answer in 30-50 words.
. Prepare a list of at least seven (7) potential sources of information to help define the customer service standards for an organisation.
c. Provide an example of organisational requirements for answering phone call. Write your answer in XXXXXXXXXXwords.
4.
Answer the following:
a) What is an ICT system? What are the three (3) core components of ICT system. Provide at least two (2) examples and write your answer in XXXXXXXXXXwords.
) What are ICT system security systems? Write your answer in 20-30 words.
c) Summarise any five (5) industry practices/procedures for security systems. Write your answer in XXXXXXXXXXwords.
5.
Identify the federal and state WHS legislation applicable to your state and explain its purpose. Write your answer in XXXXXXXXXXwords.
6.
Identify, document and explain the state and federal legislations related to the key concepts given in the table.
State and federal legislations
Explanation XXXXXXXXXXwords)
Access and equity
Copyright and intellectual property
Privacy
Answer text
State and federal legislations
Explanation XXXXXXXXXXwords)
Access and equity
Copyright and intellectual property
Privacy
7.
Answer the following:
a) What do you mean by Australian Copyright Law? Write your answer in XXXXXXXXXXwords.
) List the four (4) examples of ICT related work, protected by the copyright act.
8.
Prepare a list of any seven (7) methods to communicate new or revised policies and procedures to the stakeholders.
9. What do you mean by confidentiality, integrity and availability according to CIA triad? Write XXXXXXXXXXwords for each term.
10.
Answer the following:
a) Prepare a list of steps that you would follow to implement new ICT policies and procedures at the workplace.
) What are the five (5) factors to be considered while gathering feedback from the stakeholders during the implementation process? Write your answer in XXXXXXXXXXwords.
11.
Answer the following:
a) What are the five (5) factors to ensure confidentiality of stakeholder’s interest? Write your answer in XXXXXXXXXXwords.
) What do you understand by the term proprietary rights of stakeholder’s interest? Write your answer in XXXXXXXXXXwords.
12.
What are the ten (10) considerations, for drafting or updating organisation’s privacy policy and procedures? Write your answer in XXXXXXXXXXwords.
13.
Explain different measures that can be implemented to avoid a
each of copyright complaint. Write your answer in XXXXXXXXXXwords.
14.
Answer the following:
a. Why is it important to review the code of ethics of the organisation? Write your answer in single sentence.
. How should the review of the code of the ethics to be conducted? Write your answer in 30-50 words.
c. How can you review the staff understanding of the code of ethics? Write your answer in 30-50 words.