Assessment 2 - Case Study-ICTNWK559
Assessment 2 - Case Study-ICTNWK559
Unit Name and Code: ICTNWK559 - Install an enterprise virtual computing environment
To be completed by Trainer
FEEDBACK
Case Study:
Scenario:
You have started working with an ICT organisation, Digital Aus Solutions Pty Ltd. The
organisation has their offices in all Australian states. The organisation requires you to
set up virtual computing infrastructure and environments, with a view to developing a
All performance objectives must be carried out in compliance with the business's
enterprise requirements in which the system operates.
In this assessment activity, you are required to determine enterprise virtual computing
requirements.
In this assessment task, you are required to demonstrate your skills in a computer lab.
If you are studying remotely or online, consider your desktop with access to a live
webcam session with your trainer/assessor as an extension to the computer lab. Your
assessor will assess your skills according to the performance criteria below.
You must complete this task based upon the information provided in the scenarios and
other relevant sections of this assessment task.
Templates
You must use the templates wherever provided as part of the assessment activity.
How have you analysed By analysing the web-site, also taking clients-feedback.
organisational virtual
computing environment and
determine organisational
needs
How have you analysed the By using a Google-forms with the web-site consumers.
virtualisation host software?
How have you evaluated Upon conclusion of the analysis, produce a summary of
system requirements? any security requirements which could be needed. It's
needed for the software program to check out every
user input to be able to make sure it doesn't go over
the maximum size allowed for that type of input. All
requests for accessing the limited Sites have to be
authenticated by the server before they could be
digested. Whenever a browser have been authenticated,
the server should decide if that browser is allowed (i.e.,
has got the needed credentials) to use the limited
learning resource which was previously requested. The
device has to be safeguarded against denial of service
attacks by the implementation of security measures.
In this assessment activity, you are required to analyse the virtualisation host
software
In this assessment task, you are required to demonstrate your skills in a computer lab.
If you are studying remotely or online, consider your desktop with access to a live
webcam session with your trainer/assessor as an extension to the computer lab. Your
assessor will assess your skills according to the performance criteria below.
You must complete this task based upon the information provided in the scenarios and
other relevant sections of this assessment task.
Templates
You must use the templates wherever provided as part of the assessment activity.
Discuss how have you In order to accommodate this need, a hard drive
determined virtualisation host with at least 32GB and a maximum-capacity of
software requirements 64GB is recommended.
serial advanced
technology attachment
(SATA)
virtualisation technology
at the central processing
unit level (VT(x)) support.
How have you identified and I have done the research of mine and discovered
compared industry standard the many app options which are available.
virtualisation host software? Afterwards, I managed to identify the functions
they all have along with the attributes that
separate them.
Determine and document A user 's last and first name, telephone number,
recommended virtualisation host username and email address and password are
software and submit to required mandatory fields being finished. The following are
personnel. several of the attainable options to consider:
business name, country, zip code, state, city,
address, address1, title, and fax number tend to
be essential fields in the form. It's needed for the
software program to check out every user input to
be able to make sure it doesn't go over the
maximum size allowed for that type of input. All
requests for accessing the limited Sites have to be
authenticated by the server before they can be
digested. After the web browser was confirmed by
the server, it's the server's duty to find out
whether the internet browser is authorized (i.e.,
has got the needed credentials) to view the limited
Sites requested. Through the usage of protection
measures, it's essential to defend the device
against denial of service (DOS) attacks.