Install and manage complex ICT networks 1. Describe two typical firewall configurations and how these configurations can be applied to securing a network. 2. Define the purpose of network time...

1 answer below »
When can i get this done



Install and manage complex ICT networks 1. Describe two typical firewall configurations and how these configurations can be applied to securing a network. 2. Define the purpose of network time protocol (NTP) in a network. 3. Define the purpose of server messages block (SMB) in a network. List (i) two resources that can be shared with SMB and (ii) two operating systems that support the SMB protocol. 4. Define the roles of the following protocols in email systems (i) SMTP (ii) IMAP. 5. Define the purpose of (i) a forward proxy server and (ii) a reverse proxy server in a network. 6. Define the purpose of the following types of HTTP Requests to a web server: (i) GET (ii) POST.  7. Describe what is meant by network service management as it applies to (i) quality of service and (ii) availability measures in a network. 8. Identify two network diagnostic utilities, and describe how they could be used in troubleshooting a connectivity problem. 9. Describe the purpose of user authentication and directory services in a network. 10. Describe the purpose of voice over internet protocol (VoIP), and give an example of how it could be used in a network to lower telephone costs. 11. Describe the basic concept of a site-to-site virtual private network (VPN) and give an example of how it could be used to securely connect two network locations. 12. Define the purpose of the following IP-related configuration parameters:  a. IP Address  b. Subnet mask  c. Default gateway 13. Describe the basic concept of a remote access virtual private network, and give an example of how it could be used to securely connect to a network across the internet. 14. You are attempting to integrate two sites (Melbourne and Geelong) by implementing a site-to-site VPN between the two locations. The protocol you implement between the two sites is IPSec which requires a shared secret to be configured at each VPN end point, and you configure the shared secret “MySecret” at the Melbourne VPN end point only. When you try to connect the VPN from Melbourne to Geelong, the connection fails, with the Geelong VPN end point reporting is is unable to decrypt the date. What is the problem, and how can you rectify it? 15. You add a new printer to an existing IPv4 network that supports both IPV6 and IPv4 addressing, but you only configure an IPv6 address for the device. When you power on the printer to test it’s connectivity to the rest of the network, you get a message “unable to connect to network”. . What is the problem, and how can you rectify it? 16. List the type of unshielded twisted pair (UTP) cables I would need to install to support the following types of connections (i) 1 Gb Ethernet (ii) 10Gb Ethernet. 17. Give two examples of types of hardware that would be found in a network infrastructure. 18. Describe how load balancing can be used in the deployment of web applications. 19. Give two examples of security measures that can be taken to improve network security. 20. List two examples of server operating systems commonly used in industry today. 21. Define the purpose of domain name system (DNS) in a network. What is role of (i) AAAA records and (ii) MX records in DNS? 22. Define the purpose of dynamic host configuration protocol (DHCP) in a network. What is meant by (i) a DHCP scope and (ii) a DHCP exclusion? 23. Define the purpose of file transfer protocol (FTP) in a network. What are the FTP commands to (i) list all files in a directory and (ii) get a file from a FTP server onto an FTP client? Manage IP, ethics and privacy in ICT environments 1. In context of the Australian Computer Society Code of Ethics, explain your responsiblies for the following values:  a. The Primacy of the Public Interest b. Professional Development Write your answer in 150-200 words.   2. Explain the processes that an organisation can use to communicate its policies and procedures to its employees? Write 30-50 words for each communication method.  3. Answer the following: a. Explain the purpose of organisational standards for customer service. Write your answer in 30-50 words.  b. Prepare a list of at least seven (7) potential sources of information to help define the customer service standards for an organisation.  c. Provide an example of organisational requirements for answering phone call. Write your answer in 100-150 words. 4. Answer the following:  a) What is an ICT system? What are the three (3) core components of ICT system. Provide at least two (2) examples and write your answer in 100-150 words. b) What are ICT system security systems? Write your answer in 20-30 words.  c) Summarise any five (5) industry practices/procedures for security systems. Write your answer in 150-200 words.  5. Identify the federal and state WHS legislation applicable to your state and explain its purpose. Write your answer in 50-100 words. 6. Identify, document and explain the state and federal legislations related to the key concepts given in the table.  State and federal legislations Explanation (30-50 words) Access and equity Copyright and intellectual property Privacy Answer text State and federal legislations Explanation (30-50 words) Access and equity                     Copyright and intellectual property         Privacy         7. Answer the following:  a) What do you mean by Australian Copyright Law? Write your answer in 50-100 words.  b) List the four (4) examples of ICT related work, protected by the copyright act. 8. Prepare a list of any seven (7) methods to communicate new or revised policies and procedures to the stakeholders. 9. What do you mean by confidentiality, integrity and availability according to CIA triad? Write 50-100 words for each term. 10. Answer the following:  a) Prepare a list of steps that you would follow to implement new ICT policies and procedures at the workplace.  b) What are the five (5) factors to be considered while gathering feedback from the stakeholders during the implementation process? Write your answer in 100-150 words. 11. Answer the following:  a) What are the five (5) factors to ensure confidentiality of stakeholder’s interest? Write your answer in 50-100 words. b) What do you understand by the term proprietary rights of stakeholder’s interest? Write your answer in 50-100 words. 12. What are the ten (10) considerations, for drafting or updating organisation’s privacy policy and procedures? Write your answer in 100-150 words. 13. Explain different measures that can be implemented to avoid a breach of copyright complaint. Write your answer in 100-150 words. 14. Answer the following:  a. Why is it important to review the code of ethics of the organisation? Write your answer in single sentence.  b. How should the review of the code of the ethics to be conducted? Write your answer in 30-50 words.  c. How can you review the staff understanding of the code of ethics? Write your answer in 30-50 words.
Answered 163 days AfterSep 14, 2022

Answer To: Install and manage complex ICT networks 1. Describe two typical firewall configurations and how...

Sanjukta answered on Sep 19 2022
60 Votes
Manage IP, ethics and privacy in ICT environments
1.
In context of the Australian Computer Society Code of Ethics, explain your responsibilities for the following values: 
a. The Primacy of the Public Interest
As per the Australian Computer Society Code of Ethics, I must place the interests of the public above that business, personal or the sectional interests. Furthermore, in accordance to with this value I will also:
- identify the people who are significantly imp
acted by the work as well as considering their interests explicitly
- advising the stakeholders about any significant conflicts between the legal and professional activity or other accepted requirements of the public
- The intellectual property of other people should be respected
b. Professional Development
According to the value an individual will be:
· Continuously upgrade the skills and knowledge
· Encouraging the employees, colleagues, as well as the students for continuing their own professional development
· Supporting training, education, and professional development in ICT that tends to reflect the needs of the professional and their different career paths
· Enhancing the awareness of the problems that is affecting the profession along with the relationship with the public
Write your answer in 150-200 words.
2.
Explain the processes that an organisation can use to communicate its policies and procedures to its employees? Write 30-50 words for each communication method.
3. The policies and procedures can be communicated to the workers of a company by following ways:
- Informing the workers up-front and explaining the workers why the information holds so much of importance
- Asking the staffs for feedback for encouraging their employee buy-in and involvement
- Providing the staffs with required amount of training as some of the procedures and policies demand an intensive and extensive training
Answer the following:
a. Explain the purpose of organisational standards for customer service. Write your answer in 30-50 words. 
Firms tend to adopt the standards for consumer service for resolving problems, complaints as satisfactorily as possible for both company and consumer. Strongest consumer service standards have the potential to help a firm retain a lot of loyal consumers and enhance profits to a great extent.
b. Prepare a list of at least seven (7) potential sources of information to help define the customer service standards for an organisation. 
The seven potential sources are as follows:
- Management
- Workers
- Existing consumers
- Significant consumers
- Former or Lost consumers
- Regulatory authorities
- Competitive information
c. Provide an example of organisational requirements for answering phone call. Write your answer in 100-150 words.
There are some of the organisational requirements that is required for answering a phone call. Following is an example in terms of the organisational requirements:
- Answering all phone calls before the third ring takes place
- Offering a greeting such as an employee can state the name of the company, introduce them by the name and ask how they might help the caller who is on line
- Controlling the language when answering the phone such as slangs needs to be avoided at any cost
- Maintaining an upbeat and positive tone will also feel the callers quite at ease and welcomed.
4.
Answer the following: 
a) What is an ICT system? What are the three (3) core components of ICT system. Provide at least two (2) examples and write your answer in 100-150 words.
An ICT system is basically a set-up that consists of software, hardware, people and also software data who use them. Furthermore, it consists of communications technology like internet. Computers and ICT is not the same thing at all. ICT systems also tends to work by taking the inputs, producing them and then producing outputs that are stored or communicated in some way.
Some of the main components of the ICT system are data, hardware and the people. For example, data is concerned with figures and raw facts whereas people is concerned with the data that is entered by human beings like a keyboard
b) What are ICT system security systems? Write your answer in 20-30 words. 
ICT security measures are an absolute necessity for protecting confidential unauthorised use and confidential information
c) Summarise any five (5) industry practices/procedures for security systems. Write your answer in 150-200 words. 
5. Following are some of the main industry practices for the security systems:
- Remote access: The remote employees do not have the priviledge of company’s network and physical security provisions, so they needs to be instructed every now and then in...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here