You are on page 1of 7

1. Explain the process for user authentication.

User authentication is the verification of an active human-to-machine transfer of


credentials required for confirmation of a user’s authenticity; the term contrasts with
machine authentication, which involves automated processes that do not require user input. real
authentication and identification. The user's identity is provided to the security system during the
identification step. A user ID is used to establish this identification. The security system will check
all of the abstract objects it recognizes for the specific one that the present user is using. The user
will be identified once this is completed. The fact that the user claims something does not always
imply that it is true.

2. Explain the purpose of network directory services and an outline of the process for network
services directory configuration.
Directory services are software systems that store, organise and provide access to
directory information in order to unify network resources. Directory services map the network
names of network resources to network addresses and define a naming structure for networks.
The directory service provides transparency to protocols and network topology, permitting users to
access resources without having to be aware of the physical location of the devices. 
It is advised to select the same method for all defined directory services in the Workspace Control
Console.
In some situations, the order in which Directory Services are processed may be important. When a
user starts a session, Workspace Control starts at the top of the list of Directory Services
configured in the Console. The first configured Directory Service that matches the user's logon
domain becomes the primary directory service for the session.
The following order is usually advisable:

 all Active Directory Services

 all Microsoft Windows Domain Directory Services

 the Local Computer Directory Service

 In complex environments, you may need to experiment with this order.

3. Explain best practice for implementing backup and recovery procedures.


Step 1: Understand the backup environment
it's important to conduct a thorough assessment and inventory of the existing backup environment,
including backup servers and clients, automated libraries, backup media and storage networking
components.
Step 2: Perform capacity planning Once the assessment and inventory are completed and the
backup infrastructure is understood and documented, the next step is to perform capacity planning.
The purpose of capacity planning is to identify the sources of storage growth and perform a gap
analysis to determine the differences between the current infrastructure capabilities vs.
expected requirements.
Step 3: Analyse current policies and procedures
ICTNWK505 Design, build and test a network server Assessor Marking Guide

Review current policies and procedure related to WHS, disaster recovery, security and
data requirements.
Step 4: Determine resource constraints Key resource areas that must be reviewed include
personnel constraints, physical infrastructure constraints and financial constraints.
Step 5: Install backup and restore services
Install backup and restore services on the server and follow all the instruction of the relevant
policies and backup requirements.
Step 6 : Test the backup and restore services Test the backup and restore services to make sure it
is working according to the excepted standards.
Step 7: Implement Implement the backup and restore.

4. Explain the process for error and event logging and reporting during a server installation.

Error and event logging and reporting

An error and event log are a basic "log book" that is analysed and monitored for higher level
"network intelligence." It can capture many different types of information. For example, it can
capture all logon sessions to a network, along with account lockouts, failed password attempts, etc.

The error reporting feature enables users to notify Microsoft of application faults, kernel faults,
unresponsive applications, and other application specific problems. Microsoft can use the error
reporting feature to provide customers with troubleshooting information, solutions, or updates for
their specific problems

5. Explain the purpose of RAID. Write a summary of the process for setting up RAID.

RAID, or a Redundant Array of Independent Disks, is usually a configuration for enterprise


systems. It brings together multiple hard drives using striping, mirroring, or parity to create a
reliable data store within a network or computer. It takes a bit of work, but for a hobbyist or
someone who needs reliable storage, it can deliver great results.

Configuring RAID in Windows 10

1. Install the hard drives into your computer and let it boot into Windows 10.

2. Back up everything you cannot afford to lose from your OS drive before starting.

3. Type or paste ‘Storage Spaces’ into Search Windows.

4. Select Create a new pool and storage space. Windows will check all drives and select them in
the next window.

Page | 2

WSC-AMG-BSBWOR501_24022020_V1.0

International College of Australia Pty Ltd T/A Western Sydney College


RTO: 45360 | CRICOS PROVIDER CODE: 03690M
ICTNWK505 Design, build and test a network server Assessor Marking Guide

5. Select the RAID type under Resiliency by selecting the drop down menu. Simple pools the disks,
Two-way mirror and three-way mirror are similar to RAID 1, and Parity is similar to RAID 5.

6. Set the drive size under Size if necessary. It should default to the correct setting.

7. Select Create storage space.

8. Wait for the process to complete and you should then see a single disk with the correct size in
Windows Explorer.

9. Type or paste ‘Manage Storage Spaces’ into the Search Windows box to keep an eye on the
array.

Configuring RAID in Windows 10 is now easier than ever. Just remember to keep an eye on error
reporting once you have it set up in case of any issues.

6. Explain documentation requirements in relation to server installation.

The presence of documentation helps keep track of all aspects of an application and it improves on
the quality of a software product. Its main focuses are development, maintenance and knowledge
transfer to other developers. Successful documentation will make information easily accessible,
provide a limited number of user entry points, help new users learn quickly, simplify the product
and help cut support costs. Documentation is usually focused on the following components that
make up an application: server environments, business rules, databases/files, troubleshooting,
application installation and code deployment.

 Skills to create a network documentation policy

Skills to create a network topology diagram

Skills to assess the server names, roles and IP addresses

Skills to document software versions and proof of licenses

Skills to documents the hardware components, it includes:

The documentation should include information such as:

o How is the device connected to the network?

o How is the device configured?

Page | 3

WSC-AMG-BSBWOR501_24022020_V1.0

International College of Australia Pty Ltd T/A Western Sydney College


RTO: 45360 | CRICOS PROVIDER CODE: 03690M
ICTNWK505 Design, build and test a network server Assessor Marking Guide

o Does a backup of the configuration exist?

o What firmware revision is the device running?

o Is the device configured to use a password?

Skills to document the active directory

7. Give one example of a background process and how and why you would terminate it.

a background process executes independently of the shell, leaving the terminal free for other
work. To run a process in the background, include an & (an ampersand) at the end of the
command you use to run the job. Following are some examples:

To run the count program, which will display the process identification number of the job, enter:

 count &

To check the status of your job, enter:

 jobs

To bring a background process to the foreground, enter:

 fg

If you have more than one job suspended in the background, enter:

 fg %#

Replace # with the job number, as shown in the first column of the output of the jobs command.

You can kill a background process by entering:

 kill PID

Replace PID with the process ID of the job. If that fails, enter the following:

 kill -KILL PID

To determine a job's PID, enter:

 jobs -l

If you are using sh, ksh, bash, or zsh, you may prevent background processes from sending error
messages to the terminal. Redirect the output to /dev/null using the following syntax:

 count 2> /dev/null &

To end all background processes, go to Settings, Privacy, and then Background Apps. Turn off the
Let apps run in the background. To end all Google Chrome processes, go to Settings and then

Page | 4

WSC-AMG-BSBWOR501_24022020_V1.0

International College of Australia Pty Ltd T/A Western Sydney College


RTO: 45360 | CRICOS PROVIDER CODE: 03690M
ICTNWK505 Design, build and test a network server Assessor Marking Guide

Show advanced settings. Kill all related processes by unchecking Continue running background
apps when Google Chrome is closed.

8. Describe the benefit of using task scheduling utilities and give one example.

The Task Scheduler is a tool included with Windows that allows predefined actions to
be automatically executed whenever a certain set of conditions is met. For example, you
can schedule a task to run a backup script every night, or to send you an email whenever a certain
system event occurs. The Task Scheduler enables you to automatically perform routine tasks on a
chosen computer.
The Task Scheduler does this by monitoring whatever criteria you choose to initiate the
tasks (referred to as triggers) and then executing the tasks when the criteria is met. Task Scheduler
is a component of Microsoft Windows that provides the ability to schedule the launch of programs
or scripts at pre-defined times or after specified time intervals: job scheduling (task scheduling). It
was first introduced in the Microsoft Plus for Windows 95 as System Agent

Page | 5

WSC-AMG-BSBWOR501_24022020_V1.0

International College of Australia Pty Ltd T/A Western Sydney College


RTO: 45360 | CRICOS PROVIDER CODE: 03690M
ICTNWK505 Design, build and test a network server Assessor Marking Guide

Page | 6

WSC-AMG-BSBWOR501_24022020_V1.0

International College of Australia Pty Ltd T/A Western Sydney College


RTO: 45360 | CRICOS PROVIDER CODE: 03690M
ICTNWK505 Design, build and test a network server Assessor Marking Guide

Assessment Task 1 Checklist

Page | 7

WSC-AMG-BSBWOR501_24022020_V1.0

International College of Australia Pty Ltd T/A Western Sydney College


RTO: 45360 | CRICOS PROVIDER CODE: 03690M

You might also like