0% found this document useful (0 votes)
52 views15 pages

ICTNWK559 Assessment Task 1

none

Uploaded by

imrenson12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views15 pages

ICTNWK559 Assessment Task 1

none

Uploaded by

imrenson12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

ASSESSMENT TASK 1

ICTNWK559 - Install an enterprise virtual computing environment

ICT60120- Advanced Diploma of Information Technology

ICTNWK559 - Install an Enterprise Virtual Computing Environment 1 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
Pre-Assessment Checklist: Task 1 - Knowledge Test
The purpose of this checklist
The pre-assessment checklist helps students determine if they are ready for assessment. The
trainer/assessor must review the checklist with the student before the student attempts the
assessment task. If any items of the checklist are incomplete or not clear to the student, the
trainer/assessor must provide relevant information to the student to ensure they understand the
requirements of the assessment task. The student must ensure they are ready for the assessment
task before undertaking it.
Section 1: Information for Students
☐ Make sure you have completed the necessary prior learning before attempting this assessment.
☐ Make sure your trainer/assessor clearly explained the assessment process and tasks to be
completed.
☐ Make sure you understand what evidence is required to be collected and how.
☐ Make sure you know your rights and the Complaints and Appeal process.
☐ Make sure you discuss any special needs or reasonable adjustments to be considered during the
assessment (refer to the Reasonable Adjustments Strategy Matrix - Appendix A and negotiate
these with your trainer/assessor).
☐ Make sure that you have access to a computer and the internet (if you prefer to type the
answers).
☐ Make sure that you have all the required resources needed to complete this assessment task.
☐ The due date of this assessment task is in accordance with your timetable.
☐ In exceptional (compelling and compassionate) circumstances, an extension to submit an
assessment can be granted by the trainer/assessor. Evidence of the compelling and
compassionate circumstances must be provided together with your request for an extension to
submit your assessment work.
☐ The request for an extension to submit your assessment work must be made before the due
date.
Section 2: Reasonable adjustments
I confirm that I have reviewed the Reasonable Adjustments guidelines and criteria as
provided in Appendix A and attached relevant evidence as required and select the correct
checkbox.
☐ I do require reasonable adjustment
☐ I do not require reasonable adjustment

ICTNWK559 - Install an Enterprise Virtual Computing Environment 2 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
Declaration (Student to complete)
☐ I confirm that the purpose and procedure of this assessment task has been clearly explained to
me.
☐ I confirm that I have been consulted about any special needs I might have in relation to the
assessment process.
☐ I confirm that the criteria used for this assessment has been discussed with me, as have the
consequences and possible outcomes of this assessment.
☐ I confirm I have accessed and understand the assessment information as provided in the
Training Organisation’s Student Handbook.
☐ I confirm I have been given fair notice of the date, time, venue and/or other arrangements for
this assessment.
☐ I confirm that I am ready for assessment.

Student Name: ______________________________________

Student Signature: ___________________________________

Assessment method-based instructions and guidelines:


Knowledge Test
Assessment type

● Written Questions

Instructions provided to the student:

Assessment task description:

● This is the first (1) assessment task you must successfully complete to be deemed
competent in this unit of competency.
● The Knowledge Test is comprised of five (5) written questions

● You must respond to all questions and submit them to your Trainer/Assessor.

● You must answer all questions to the required level, e.g. provide an answer within the
required word limit, to be deemed satisfactory in this task
● You will receive your feedback within two (2) weeks, and you will be notified by your
Trainer/Assessor when your results are available.

Applicable conditions:

ICTNWK559 - Install an Enterprise Virtual Computing Environment 3 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
● All knowledge tests are untimed and are conducted as open book assessment (this means
you can refer to your textbook during the test).
● You must read and respond to all questions.

● You may handwrite/use a computer to answer the questions.

● You must complete the task independently.

● No marks or grades are allocated for this assessment task. The outcome of the task will be
Satisfactory or Not Satisfactory.
● As you complete this assessment task, you are predominately demonstrating your written
skills and knowledge to your trainer/assessor.

Resubmissions and reattempts:

● Where a student’s answers are deemed not satisfactory after the first attempt, a
resubmission attempt will be allowed.
● The student may speak to their trainer/assessor if they have any difficulty in completing
this task and require reasonable adjustments.
● For more information, please refer to the Training Organisation’s Student Handbook.

Location:

● This assessment task may be completed in:

☐ a classroom
☐ learning management system (i.e. Moodle),
☐ workplace,
☐ or an independent learning environment.

● Your trainer/assessor will provide you with further information regarding the location for
completing this assessment task.

Instructions for answering the written questions:

ICTNWK559 - Install an Enterprise Virtual Computing Environment 4 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
● Complete a written assessment consisting of a series of questions.

● You will be required to answer all the questions correctly.

● Do not start answering questions without understanding what is required. Read the
questions carefully and critically analyse them for a few seconds; this will help you to
identify what information is needed in the answer.
● Your answers must demonstrate an understanding and application of the relevant concepts
and critical thinking.
● Be concise, to the point and write answers within the word-limit given to each question. Do
not provide irrelevant information. Remember, quantity is not quality.
● You must write your responses in your own words.

● Use non-discriminatory language. The language used should not devalue, demean, or
exclude individuals or groups based on attributes such as gender, disability, culture, race,
religion, sexual preference or age. Gender-inclusive language should be used.
● When you quote, paraphrase, summarise or copy information from other sources to write
your answers or research your work, always acknowledge the source.

Purpose of the assessment

This assessment task is designed to develop and implement virtualisation technologies to


implement and enhance the efficiency and reliability of the Information and Communications
Technology (ICT) environment & knowledge regarding to the following:

● Knowledge of government and industry policies and guidelines relating to the development
of efficient and reliable, information and communications technology (ICT) environments
● Knowledge of recommendations on sustainability options in ICT design

● Knowledge of benefits of virtualisation

● Knowledge of processes and procedures for installing and configuring virtualisation


software and virtual machines
● Knowledge of processes and procedures for configuring virtual machines into network
design
● Knowledge of industry standard tools and software applications required to manage virtual
machines
● Knowledge of configuration of software applications required to manage virtual machines

● Knowledge of configuration required to integrate virtual machines into existing network


design.

Task instructions

ICTNWK559 - Install an Enterprise Virtual Computing Environment 5 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
● This is an individual assessment.

● To ensure your responses are satisfactory, consult a range of learning resources and other
information such as handouts, textbooks, learner resources etc.
● To be assessed as Satisfactory in this assessment task, all questions must be answered
correctly.

ICTNWK559 - Install an Enterprise Virtual Computing Environment 6 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
Assessment Task 1: Knowledge Test
Provide your response to each question in the box below.

Q1: Answer the following questions regarding government and Satisfactory response
industry policies and guidelines, relating to the development
of efficient and reliable, Information and Communications Yes ☐ No ☐
Technology (ICT) environments

1.1. Identify three (3) regulations, policies or guidelines


related to virtual computing environments.

1.2. What are the four (4) outcomes expected of Protective


Security Policy Framework (PSPF)?

1.3. Discuss “adequate security” provisions mentioned in the


Australian Government Cloud Computing Strategic Direction
Paper using 20-40 words.

Reference: Australian Government Cloud Computing Strategic


Direction Paper, Dept of Finance, April 2011 Version 1.

ICTNWK559 - Install an Enterprise Virtual Computing Environment 7 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
1.1 The General Data Protection Regulation (GDPR) is an EU law governing data protection and
privacy for individuals within the European Union and the European Economic Area. While not
specifically targeting virtual computing environments, GDPR imposes strict requirements on how
personal data is stored, processed, and protected, extending to data within virtual environments
and regulating its transfer outside EU and EEA areas.

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards
ensuring secure environments for companies handling credit card information. It applies to
organizations processing, storing, or transmitting credit card data, including those using
virtualized IT infrastructures. Compliance with PCI DSS involves implementing various security
measures, which also extend to virtualized systems to protect cardholder data.

The National Institute of Standards and Technology (NIST) Special Publication 800-53 (NIST SP
800-53) offers a catalog of security and privacy controls for federal information systems and
organizations, serving as a cybersecurity framework widely used across sectors. It includes
specific controls relevant to virtualized environments such as virtual machine security, hypervisor
security, network segmentation, and data protection. Organizations reference NIST SP 800-53 to
design and implement security measures in virtual computing environments, ensuring compliance
and robust security.

1.2 The Protective Security Policy Framework (PSPF) serves to bolster decision-making by
offering a structured method for evaluating and managing security risks. This empowers
organizations to discern and prioritize risks effectively, leading to more informed choices
regarding security measures and resource distribution.

Furthermore, the PSPF strives to elevate the safeguarding of government personnel, sensitive

data, and vital assets. By adhering to the security controls and strategies delineated in the

framework, organizations can preemptively address security threats and vulnerabilities, thus

diminishing the likelihood of security breaches and incidents.

Moreover, the PSPF fosters collaborative efforts and information exchange among government

entities to fortify the collective security posture. By harmonizing security practices and standards

across various agencies, organizations can facilitate seamless cooperation and coordination in

tackling security challenges and adapting to emerging threats.

ICTNWK559 - Install an Enterprise Virtual Computing Environment 8 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
Lastly, the PSPF underscores the significance of accountability and adherence to security policies

and norms. By complying with the stipulated requirements, organizations can showcase their

dedication to upholding a robust security stance and fulfilling their responsibilities to safeguard

sensitive information and assets. This entails routine monitoring, assessment, and reporting on

security performance to ensure ongoing compliance with PSPF mandates.

1.3 The "adequate security" provisions outlined in the Australian Government Cloud Computing
Strategic Direction Paper emphasize ensuring robust security measures are in place to protect
government data hosted in cloud environments, aligning with national security standards.

Q2: Answer the following questions regarding industry standards Satisfactory response
technologies and processes, designed to produce an efficient
and reliable ICT environment Yes ☐ No ☐

2.1. What does a sustainable ICT environment really mean?


Answer using 30-60 words.

2.2. What is the purpose of ISO 27002? Answer using 30-60


words.

ICTNWK559 - Install an Enterprise Virtual Computing Environment 9 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
2.1 A sustainable ICT environment involves utilizing Information and Communication Technology
(ICT) resources and strategies to minimize environmental harm, optimize resource usage, and
advance economic and social progress. It encompasses practices like energy efficiency, waste
reduction, and lowering carbon footprint, aligning with long-term sustainability objectives.

2.2 ISO 27002 serves as a comprehensive guideline for implementing information security
controls. It provides a framework for organizations to establish, implement, maintain, and
continually improve an Information Security Management System (ISMS), addressing various
aspects of information security, risk management, and compliance with regulatory requirements.

Q3: Answer the following questions regarding benefits and costs of Satisfactory
virtualisation response
Yes ☐ No ☐
3.1. What are the advantages of virtualization? Answer using 30-
60 words.

3.2. How much does virtualization cost? Answer using a reference


to an online study.

ICTNWK559 - Install an Enterprise Virtual Computing Environment 10 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
3.1 Virtualization offers numerous advantages, including efficient resource utilization, cost
savings through hardware consolidation, flexibility in scaling resources, improved disaster
recovery and business continuity, simplified management and maintenance, faster provisioning of
IT services, and enhanced testing and development environments, leading to increased agility and
innovation in IT infrastructure.

3.2 3.1 Virtualization offers numerous advantages, including efficient resource utilization, cost
savings through hardware consolidation, flexibility in scaling resources, improved disaster
recovery and business continuity, simplified management and maintenance, faster provisioning of
IT services, and enhanced testing and development environments, leading to increased agility and
innovation in IT infrastructure.

3.2
The expense associated with virtualization can fluctuate significantly based on variables such as
the chosen virtualization technology, the scope of deployment, and the unique requirements of
each organization. For instance, findings from a Spiceworks study titled "2020 State of
Virtualization Technology," encompassing insights from over 500 IT professionals, revealed an
average annual expenditure of approximately $108,000 per organization on virtualization software
and its accompanying services.

ICTNWK559 - Install an Enterprise Virtual Computing Environment 11 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
Q4: Answer the following questions regarding design and Satisfactory
configuration of industry standard tools and software applications response
required to manage virtual machines and configuration required Yes ☐ No ☐
to integrate virtual machines into the existing network design

4.1. Explain the procedure to configure a VM Monitor in Windows


2012. Write your answer in 150-200 words.

4.2. How do you integrate a virtual machine in an existing


physical network? Write your answer in 50-100 words.

ICTNWK559 - Install an Enterprise Virtual Computing Environment 12 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
4.1

To configure a VM Monitor in Windows Server 2012, follow these steps:

1. Install Hyper-V Role:


○ Open Server Manager and go to Manage > Add Roles and Features.
○ In the wizard, select Hyper-V from the list of roles and complete the
installation. After installation, the server may require a restart.
2. Enable Virtual Machine Monitor:
○ The VM Monitor feature in Hyper-V helps monitor the status of virtual machines
(VMs). Once Hyper-V is installed, use the Hyper-V Manager to configure and
manage VMs.
3. Configure Virtual Machine:
○ Open Hyper-V Manager from the Start menu.
○ Select the VM you want to monitor, right-click it, and choose Settings. You can
configure settings such as CPU, memory, and virtual network.
4. Enable Performance Monitoring:
○ To monitor VMs, you can configure performance counters for CPU, memory,
and disk usage. Open Performance Monitor (type “perfmon” in the search bar),
and add counters for Hyper-V, such as Hyper-V Virtual Processor or Hyper-V
Virtual Machine.
5. Configure Event Logging:
○ In the Event Viewer, you can monitor logs for Hyper-V. Under Applications and
Services Logs > Microsoft > Windows > Hyper-V-VMMS, you can track virtual
machine events.

4.2

To integrate a virtual machine (VM) into an existing physical network, you need to configure
the VM's network adapter to use a bridged or external network. In Hyper-V, this is done by
creating an External Virtual Switch in the Virtual Switch Manager. This virtual switch
connects the VM’s virtual network adapter to the physical network adapter of the host
machine, allowing the VM to access the same network resources (like routers, servers, or
the internet) as the physical machines. Ensure the VM is configured to obtain an IP address,
either statically or via DHCP.

ICTNWK559 - Install an Enterprise Virtual Computing Environment 13 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
Q5: Answer the following questions regarding industry standard tools Satisfactory
and software applications required to manage virtual machines response

5.1. Which tools and software applications can be used to Yes ☐ No ☐


manage virtual machines? Identify three (3).

5.2. Which tool can do virtual and physical resource monitoring?


Answer using 20-40 words.

5.1
VMware vSphere/ESXi: VMware vSphere, including the ESXi hypervisor, is a powerful
platform for managing VMs in enterprise environments. It offers tools like vCenter Server for
centralized management of virtual machines, including provisioning, monitoring, and
resource allocation.
Microsoft Hyper-V Manager: Hyper-V Manager is a management tool for Windows Server's
Hyper-V feature. It allows users to create, configure, and manage virtual machines, virtual
switches, and storage. It also provides monitoring features for VM health and resource
usage.
Oracle VM VirtualBox: VirtualBox is a free, open-source virtualization platform that allows
users to create and manage virtual machines. It provides a user-friendly interface and
supports various guest operating systems, making it popular for personal and small-scale
VM management.

5.2
Microsoft System Center Virtual Machine Manager (SCVMM) is a tool that allows
for both virtual and physical resource monitoring. It provides comprehensive management
of virtual machines, hosts, and physical servers, offering insights into performance,
resource utilization, and health.

ICTNWK559 - Install an Enterprise Virtual Computing Environment 14 | Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024
ICTNWK559 - Install an Enterprise Virtual Computing Environment 15 | Page
Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 January 2024

You might also like