You are on page 1of 7

Assessment Task 1: Knowledge Questions

1. An ICT implementation plan will be needed to guide the implementation of an


enterprise communication system. List four requirements that could be included as
part of an ICT implementation plan.

a) load balancing for applications: This ensures that network traffic is balanced across
two Wider Area Networks. For example, web or email traffic data is spread out over
the bandwidth used by each Local area network allowing for greater bandwidth
capability.

b) server or directory administration : Manages access to the network such as users,


groups, computers and printers.

c) Infrastructure : The collection of hardware and software of the network that permits
connectivity, communication and management of an enterprise network. An example
would be a router or a firewall.

d) web server administration. : It offers a comprehensive overview of the tools and


techniques needed to succeed. It requires updates, patches, security functionality, and
needs to ensure that the webpage hosted is working properly.

2. Complete the following table regarding an email server application.


A mail server is a computer system that
Purpose of an email server application.
sends and receives email over the
internet. This is an application or
computer in a network whose sole
purpose is to act as a virtual post office
where mail is stored and sorted before
being sent to its final destination. The
server stores incoming mail for
distribution to local users and sends out
outgoing messages.
An example of an email server Here are some examples of the most
application common free email servers and the
format for their mail server addresses:
 Gmail incoming mail
server: pop.gmail.com
 Gmail outgoing mail
server: smtp.gmail.com
 Yahoo! incoming mail
server: pop.mail.yahoo.com
Two key features of the email server  Advanced Access and Security
Controls
application you have provided as an
 Easy to Set up and Administer
example  Fast, reliable Server management
 Highly cost effective

3. Complete the following table regarding collaboration tools.

Purpose of collaboration tools


Saved time – Time is of the essence in
any industry, and the more you can save,
the better. When employees collaborate
with each other, they’re saving your
organization time by achieving the end
goal in a much quicker fashion.

Strengthened team relationships – In


many ways, your team is like a family
unit. Building effective working
relationships between members, then, is
important. Collaboration tools are an
excellent way for team members to
become more comfortable with the
concept of working together to reach a
common goal.

Improved project management


– Managing a project or team can be
more difficult a process than many
people give it credit for. Collaboration
tools are a great way to ensure you’re
getting the most out of your team, as
they improve communication and keep
easily avoidable mistakes at bay.

Better organization – It’s easy for


things to go missing when you’re in the
middle of a project, which can result in
headaches and wasted time. Better
organization is something that every
company should strive for, even if
things are already going well.

Dropbox or Google Drive are the


An example of a collaboration tool
business sharing resources an company
uses to exchange information with its
workers to edit and transfer documents
over the internet, slack team leaders or
project managers.
Two key features of the collaboration
tools you have provided as an example  Conversation & Feedback

 Share Team Initiatives

4. Complete the following table regarding content management software.

Purpose of content management software  Content management systems,


like WordPress, were built for
users with little to no
programming experience
 Content management systems
allow multiple people to not only
have access to your website but
also easily collaborate on
different projects.
 Content management systems
offer a number of plugins and
tools that can help your site rank
better in major search engines.

An example of content management 1. Wordpress


software 2. Drupal

Two key features of content management  it helps to totally control the


software you have provided as an presentation of content as well
example as user and permission
management
 Security
 Cost effective and Affordable

5. Complete the following table regarding data protection principles.


1. Technology Fails
Explain why it is important
to have backup and Throughout the last 15 years, we’ve seen massive
restoration procedures in changes in the technology that we use. Many
businesses are now virtually paper-free. So,
place.
important documents are stored locally, on
computers.

The problem? All equipment fails eventually.


Desktops get infected with ransomware  and
viruses. Laptops inexplicably stop working. Power
surges blow out hard drives.
If your business relies on data (which most
businesses do these days), this is bad news. Telling
a customer that their service will be interrupted
or losing the information you need to make a key
business decision is the last thing you need.

2. People Make Mistakes


While we may wish that our employees were
perfect, they’re only human.

That means that they’ll make mistakes. A data


backup and recovery solution is crucial. This will
ensure that any mistakes can be corrected.

It’s easy to overlook an important step in a certain


process. You can accidentally enter the wrong data
or delete data. Sure, you need to have quality
assurance programs and efficient processes in
place. However, having an online backup plan is
just as important.
Employees accidentally leave laptops on public
transport. A cup of coffee can fry a hard drive in
less than a minute. Disgruntled employees delete
key data on their way out the door.

If any of the above happens, you need to have a


data backup and recovery solution in place.

3. Competitive Advantage
When you have a data backup and recovery
solution ready to go, you have an advantage over
your competition.

Businesses around the world have suffered huge


losses and reputation damage  after losing data.
TalkTalk lost £60m after a major hack in October
2015, after IT costs and the loss of 101,000
customers.
More than 156,000 had their personal details
accessed by hackers, causing many customers to
jump ship.

And who can forget Salesforce , which lost four


hours of transactions and customer data in May
2016? Lloyds, Barclays, and Bank of America have
also all had customer data losses and malicious
data hacks as well.
These types of breaches reduce trust in the business
itself. The customer relationship is impacted. So is
the confidence of staff, investors, shareholders, and
future customers.

When you can guarantee your customers that you


have a solid data backup and recovery plan, you
stand above businesses that can’t say the same.

4. Theft
If employees were fired or laid off, 20% said they
would be more likely to take data due to the anger
they’re experiencing. They also said they would be
more likely to pass it off to a competitor.

Unfortunately, when these employees steal data,


they’re often trying to hurt your business. That
means that if you don’t have that data backed up, it
may be deleted permanently from your system.

A firewall configuration is between your computer


Explain the importance of
and the network. It determines which
firewall configuration in services on your computer remote users on the
terms of data protection. network can access. A properly firewall
configured can greatly increase the security of your
system which to prevent unauthorized access
to or from a private network and to maximize the
security of your network. One example of
firewall is;
Packet filters – used to manage network access by
monitoring incoming and outgoing data
packet and only allowed them to access based from
the source destination address or IP address.
List two types of security
1. Strong Passwords
practices that can be 2. Reduce Data Transfers
followed to decrease the
risk of cyberattacks.

Explain the term multifactor Multi-factor Authentication (MFA) is an


authentication. authentication method that requires the user to
provide two or more verification factors to gain
access to a resource such as an application, online
account, or a VPN. MFA is a core component of a
strong identity and access management
(IAM) policy. Rather than just asking for a
username and password, MFA requires one or more
additional verification factors, which decreases the
likelihood of a successful cyber attack.

6. Explain each of the listed important features of network administration.


By using load balancing since this feature can ensure
Load balancing for
reliability and boost up performance of
applications running applications. Besides the workload were
being distribute accordingly across the network
computer, disk drive to prevent network overload.
This also ensures no solo server bears too
much work. By spreading the work in fair manner,
load balancing improves application responsiveness.
Servers - are used to transfer data to another device
Server or directory
or computer over the local area network
administration or via internet and also used to manage network over
the various computer. They transfer the
data in smart way by providing different IP addresses
to organize each destination within a
network.
Directory administration – is a software used to
manage various devices and computer over a
network. organize your company's complete
hierarchy from which computers belong on which
network, to what your profile picture looks like or
which users have access to the storage room
IT Infrastructure is the central nervous system and is
Infrastructure
responsible for ensuring a seamless service
to end users. Having complete visibility of all of your
hardware and software assets means you
can ensure you are monitoring the health of your
network. This also increased performance by
keeping up with the industry standards and having a
correct infrastructure helped a lot to informed in
decision making.
Web Server administrator role is to ensure that data is
Web server administration
available, protected from loss and
corruption, and easily accessible as needed. It is also,
responsible for the overall management
of data resources in an organization. this also ensured
that the database is up and running all
the time. Below are some functions of a server
administrator;
 Managing and monitoring data replication.
 Enrolling users and maintaining system
security.
 Controlling and monitoring user access to the
database.
 Designing and implementing backup and
restore strategies.

You might also like