Assessment Details | |
Qualification Code/Title | ICT50415 : Diploma of Information Technology Networking |
Unit of Competency | |
National Code/Title | ICTNWK529 - Install and manage complex ICT networks |
Attempts ALL Questions
PART A - ANALYTICAL SECTIONS
Please fill out the appropriate boxes in the flowchart with the correct statement from the column on the right side.
2. Network Address Translation
Determine the correct IP Address and place into the NAT Translation table. Host-A and Host-B are both communicating with the WWW server. Router-A is using dynamic NAT with a pool of address assigned by the ISP.
3. VLAN Operation
Complete the boxes with the appropriate device name to determine the path the packet would take from the source to the destination. Select no path if no path is available.
4. Part of the AHIC network is shown below:
Based on the diagram shown above, what kind of cable should be used to make each connection that is identified by the numbers shown?
5. You work as a network administrator at an ABC office. Your boss, Mr Robin, is interested in the CLI commands. Match the commands with the appropriate functions. Not all options are used.
PART B - Short Questions
VOIP
Network Management tools
PART C – Case Study
Scenario 1:
You are working in ABC Company as a Network Engineer. You need to choose a routing protocol for use in
the ABC network that meets the following requirements:
Which routing protocol fulfils these requirements? Explain it.
Scenario 2:
Nubex Pty Ltd was established just over 6 years ago. Currently, they have employed approximately 200 staff members. They have recently opened an additional office in Canberra in order to expend the business. Due to distance, Company is looking for some solution for remote communication using VOIP so that company can organise meeting using Video conference.
As an IT expert, you need to do following Tasks:
Task 1: Find the appropriate VOIP software that can be installed in Business
Task 2: Install and Configure Appropriate Software and Demonstrate it how to use it for voice chat, Video Conference and Instant Message.
Scenario 3:
In this task you will use a network monitoring tool named Wireshark (formerly known as Ethereal) to read and analyse network trace files. Wireshark is a powerful program to generate and analyse trace files in a network. It has extensive support for a huge number of Internet protocols.
Visit a web site that is password-protected and examine the sequence of HTTP message exchanged for such a site. The URL: https://ahi-elearning.mywisenet.com.au/login/index.php is password protected.
As an IT Expert, you need to do following tasks:
Task 1: Download, install and start up the Wireshark packet sniffer. You can download the Wireshark software from the following link:
Task 2: Make sure your browser’s cache is cleared, and restart your browser.
Task 3: Choose the active interface and ‘Start’ packet sniffing.
Task 4: Enter the following URL into your browser https://ahi-elearning.mywisenet.com.au/login/index.php , type the user name and password into the pop up box.
Task 5: Stop Wireshark packet capture, and enter “http” in the display-filter-specification window, so that only captured HTTP messages will be displayed later in the packet-listing window.
If the username and password that you entered are encoded in the string of characters (d2lyZXNoYXJrLXN0dWRlbnRzOm5ldHdvcms=) following the “Authorization: Basic” header in the client’s HTTP GET message. While it may appear that your username and password are encrypted, they are simply encoded in a format known as Base64 format. The username and password are not encrypted! To see this, go to http://www.base64decode.org/ and enter the base64-encoded string d2lyZXNoYXJrLXN0dWRlbnRz into the "Decode from base64" text box and press "Go". Voila! You have translated from Base64 encoding to ASCII encoding, and thus should see your username! To view the password, enter the remainder of the string Om5ldHdvcms= and press decode. Since anyone can download a tool like Wireshark and sniff packets (not just their own) passing by their network adaptor, and anyone can translate from Base64 to ASCII (you just did it!), it should be clear to you that simple passwords on WWW sites are not secure unless additional measures are taken.
Student must demonstrate all Tasks in class and also take the screen shoot of all Tasks as Evidence
Scenario 4:
You are working as IT Support Officer in Nubex Pty Ltd. Due to work load, you are not able to scan antivirus in regular basis. IT Manager has advised you to implement automated virus checking option to the computer.
You need to setup the option to scan computers every Sunday without user interaction.
Part A – Analytical Sections
1. WAN Design
Answer: Download the Attached Solution
2. Network Address Translation
Inside Local IP Address | Inside Global IP Address | Outside Global IP Address |
192.168.3.1 | 201.200.20.17 | 181.180.180.15 |
192.168.3.2 | 201.200.20.18 | 181.180.180.15 |
3. VLAN Operation
Steps | Devices |
1 | Switch A |
2 | B, C, C2, Switch B |
3 | D, E, F, F2, Switch C |
4 | G, H, I, I2 |
5 | Switch B, Switch A |
6 | No Path Found |
4. Part of AHIC network – Find the Cable
Link | Connection Between | Cable Type |
1 | CertKillerB PC to Certkiller3 Switch | Straight-through Cable (Cat 5 or 6) |
2 | Certkiller3 Switch to Certkiller3 Router | Straight-through Cable (Cat 5 or 6) |
3 | Certkiller3 Router to Certkiller4 Router | Serial (WAN Connection) |
4 | Certkiller1 Router to PC | Straight-through Cable (Cat 5 or 6) |
5. Match the Commands
Definitions | Commands |
Displays IP or MAC Address mapping on a windows PC | arp -a |
Test VTY configuration | telnet |
Display PC Network configuration | ipconfig/all |
Test TCP/IP protocol Stack | Ping 127.0.0.1 |
Display the list of routers on a path to a network destination | tracert |
PART B - Short Questions
Connect with our networking experts to get answers to short questions NOW!