ICTNWK559 Assessment Task 1
ICTNWK559 Assessment Task 1
● Written Questions
● This is the first (1) assessment task you must successfully complete to be deemed
competent in this unit of competency.
● The Knowledge Test is comprised of five (5) written questions
● You must respond to all questions and submit them to your Trainer/Assessor.
● You must answer all questions to the required level, e.g. provide an answer within the
required word limit, to be deemed satisfactory in this task
● You will receive your feedback within two (2) weeks, and you will be notified by your
Trainer/Assessor when your results are available.
Applicable conditions:
● No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
● As you complete this assessment task, you are predominately demonstrating your written
skills and knowledge to your trainer/assessor.
● Where a student’s answers are deemed not satisfactory after the first attempt, a
resubmission attempt will be allowed.
● The student may speak to their trainer/assessor if they have any difficulty in completing
this task and require reasonable adjustments.
● For more information, please refer to the Training Organisation’s Student Handbook.
Location:
☐ a classroom
☐ learning management system (i.e. Moodle),
☐ workplace,
☐ or an independent learning environment.
● Your trainer/assessor will provide you with further information regarding the location for
completing this assessment task.
● Do not start answering questions without understanding what is required. Read the
questions carefully and critically analyse them for a few seconds; this will help you to
identify what information is needed in the answer.
● Your answers must demonstrate an understanding and application of the relevant concepts
and critical thinking.
● Be concise, to the point and write answers within the word-limit given to each question. Do
not provide irrelevant information. Remember, quantity is not quality.
● You must write your responses in your own words.
● Use non-discriminatory language. The language used should not devalue, demean, or
exclude individuals or groups based on attributes such as gender, disability, culture, race,
religion, sexual preference or age. Gender-inclusive language should be used.
● When you quote, paraphrase, summarise or copy information from other sources to write
your answers or research your work, always acknowledge the source.
● Knowledge of government and industry policies and guidelines relating to the development
of efficient and reliable, information and communications technology (ICT) environments
● Knowledge of recommendations on sustainability options in ICT design
Task instructions
● To ensure your responses are satisfactory, consult a range of learning resources and other
information such as handouts, textbooks, learner resources etc.
● To be assessed as Satisfactory in this assessment task, all questions must be answered
correctly.
Q1: Answer the following questions regarding government and Satisfactory response
industry policies and guidelines, relating to the development
of efficient and reliable, Information and Communications Yes ☐ No ☐
Technology (ICT) environments
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards
ensuring secure environments for companies handling credit card information. It applies to
organizations processing, storing, or transmitting credit card data, including those using
virtualized IT infrastructures. Compliance with PCI DSS involves implementing various security
measures, which also extend to virtualized systems to protect cardholder data.
The National Institute of Standards and Technology (NIST) Special Publication 800-53 (NIST SP
800-53) offers a catalog of security and privacy controls for federal information systems and
organizations, serving as a cybersecurity framework widely used across sectors. It includes
specific controls relevant to virtualized environments such as virtual machine security, hypervisor
security, network segmentation, and data protection. Organizations reference NIST SP 800-53 to
design and implement security measures in virtual computing environments, ensuring compliance
and robust security.
1.2 The Protective Security Policy Framework (PSPF) serves to bolster decision-making by
offering a structured method for evaluating and managing security risks. This empowers
organizations to discern and prioritize risks effectively, leading to more informed choices
regarding security measures and resource distribution.
Furthermore, the PSPF strives to elevate the safeguarding of government personnel, sensitive
data, and vital assets. By adhering to the security controls and strategies delineated in the
framework, organizations can preemptively address security threats and vulnerabilities, thus
Moreover, the PSPF fosters collaborative efforts and information exchange among government
entities to fortify the collective security posture. By harmonizing security practices and standards
across various agencies, organizations can facilitate seamless cooperation and coordination in
and norms. By complying with the stipulated requirements, organizations can showcase their
dedication to upholding a robust security stance and fulfilling their responsibilities to safeguard
sensitive information and assets. This entails routine monitoring, assessment, and reporting on
1.3 The "adequate security" provisions outlined in the Australian Government Cloud Computing
Strategic Direction Paper emphasize ensuring robust security measures are in place to protect
government data hosted in cloud environments, aligning with national security standards.
Q2: Answer the following questions regarding industry standards Satisfactory response
technologies and processes, designed to produce an efficient
and reliable ICT environment Yes ☐ No ☐
2.2 ISO 27002 serves as a comprehensive guideline for implementing information security
controls. It provides a framework for organizations to establish, implement, maintain, and
continually improve an Information Security Management System (ISMS), addressing various
aspects of information security, risk management, and compliance with regulatory requirements.
Q3: Answer the following questions regarding benefits and costs of Satisfactory
virtualisation response
Yes ☐ No ☐
3.1. What are the advantages of virtualization? Answer using 30-
60 words.
3.2 3.1 Virtualization offers numerous advantages, including efficient resource utilization, cost
savings through hardware consolidation, flexibility in scaling resources, improved disaster
recovery and business continuity, simplified management and maintenance, faster provisioning of
IT services, and enhanced testing and development environments, leading to increased agility and
innovation in IT infrastructure.
3.2
The expense associated with virtualization can fluctuate significantly based on variables such as
the chosen virtualization technology, the scope of deployment, and the unique requirements of
each organization. For instance, findings from a Spiceworks study titled "2020 State of
Virtualization Technology," encompassing insights from over 500 IT professionals, revealed an
average annual expenditure of approximately $108,000 per organization on virtualization software
and its accompanying services.
4.2
To integrate a virtual machine (VM) into an existing physical network, you need to configure
the VM's network adapter to use a bridged or external network. In Hyper-V, this is done by
creating an External Virtual Switch in the Virtual Switch Manager. This virtual switch
connects the VM’s virtual network adapter to the physical network adapter of the host
machine, allowing the VM to access the same network resources (like routers, servers, or
the internet) as the physical machines. Ensure the VM is configured to obtain an IP address,
either statically or via DHCP.
5.1
VMware vSphere/ESXi: VMware vSphere, including the ESXi hypervisor, is a powerful
platform for managing VMs in enterprise environments. It offers tools like vCenter Server for
centralized management of virtual machines, including provisioning, monitoring, and
resource allocation.
Microsoft Hyper-V Manager: Hyper-V Manager is a management tool for Windows Server's
Hyper-V feature. It allows users to create, configure, and manage virtual machines, virtual
switches, and storage. It also provides monitoring features for VM health and resource
usage.
Oracle VM VirtualBox: VirtualBox is a free, open-source virtualization platform that allows
users to create and manage virtual machines. It provides a user-friendly interface and
supports various guest operating systems, making it popular for personal and small-scale
VM management.
5.2
Microsoft System Center Virtual Machine Manager (SCVMM) is a tool that allows
for both virtual and physical resource monitoring. It provides comprehensive management
of virtual machines, hosts, and physical servers, offering insights into performance,
resource utilization, and health.