ICTSAS304 Provide Basic System Administration Project Assessment

Project Assessment

Criteria

Unit code, name and release number

ICTSAS304 - Provide basic system administration (1)

ICTNWK301 - Provide network systems administration (1)

Qualification/Course code, name and release number

ICT30118 - Certificate III in Information, Digital Media and Technology (1)

For queries, please contact:

Technology and Business Services SkillsPoint

Building B, Level G, Corner Harris Street and Mary Ann Street, Ultimo NSW 2007

© 2020 TAFE NSW, Sydney
RTO Provider Number 90003 | CRICOS Provider Code: 00591E

This assessment can be found in the: Learning Bank

The contents in this document is copyright © TAFE NSW 2020, and should not be reproduced without the permission of the TAFE NSW. Information contained in this document is correct at time of printing: 30 April 2020. For current information please refer to our website or your teacher as appropriate.

Assessment instructions

Table 1 Assessment instructions

Assessment details

Instructions

Assessment overview

The objective of this assessment is to assess your knowledge and performance to:

·         maintain security access records

·         record software licenses

·         contribute to the formulation of a disaster recovery plan and provide the client with an optimised network that complies with the organisational guidelines.

Assessment Event number

1 of 2

Instructions for this  assessment

This is a project-based assessment and will be assessing you on your knowledge and performance of the unit.

This assessment is in four parts:

1.      Manage software in a networked system

2.      Record security access

3.      Provide input into disaster recovery plan

4.      Perform a backup and restore under supervision

This assessment is also supported by:

·         Assessment feedback

This will be provided after you have submitted your assessment for marking.

Submission instructions

When you have completed this assessment, submit it online for marking by your assessor.

Ensure you have typed your name at the bottom of each page of every document you create.

Submit the following documents or files for each part:

·         Part 1: Manage software in a networked system

o   Provide network systems administration—
Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).

·         Part 2: Record security access

o   Provide network systems administration—
Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1)

o   This document including screenshots of you completing the tasks for question 3.

·         Part 3: Provide input into disaster recovery plan

o   Provide network systems administration—
Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1) and screenshots for question 3.

·         Part 4: Perform a backup and restore

o   A recording of your meeting with your client (teacher) where you clarify the task requirements.

o   This assessment document including:

§  screenshots and questions for task 1

§  backup/restore record for task 2.

It is important that you keep a copy of all electronic and hardcopy assessments submitted to TAFE and complete the assessment declaration when submitting the assessment.

What do I need to do to achieve a satisfactory result?

To achieve a satisfactory result for this assessment all questions must be answered correctly and all demonstrations must be marked satisfactory.

Assessment conditions

Assessment conditions will replicate the workplace, including noise levels, production flow, interruptions and time variances. Make sure there is background noise, such as music for example, and interruptions while you are completing this assessment.

What do I need to provide?

·         A personal computer with the following minimum specification – 4GB RAM, 2GHz processor.

·         Internet access and login details.

·         A word processor, such as Microsoft Word for creating the documentation required as part of this assessment.

·         Access to screen capture software such as the Snipping Tool to take screenshots of the demonstration tasks you complete on a computer.

·         Access to MS Teams or Skype to meet with your client (teacher).

·         Speakers and a microphone (headset/webcam) to be used with your computer.

·         A USB drive or other storage method with enough free space to save work to.

·         Virtualisation software, for example Virtual Box, to set up a virtual machine. See instructions in assessment under ‘Preparation instructions’.

What will the assessor provide?

·         Access to the Learning Management System.

·         Provide network systems administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1)

·          The virtual hard disk file named CentOS7-LinuxClass-VB which is included in Cl_SysAdmin_AE_Pro_1of2_SR2.zip file.

Due date and time allowed

Indicative time to complete assessment:

·         Parts one to three—three hours

·         Part four— twenty minutes.

Supervision

Your assessor may ask for additional evidence to verify the authenticity of your submission and confirm that the assessment task was completed by you.

Reasonable adjustment

If you have a permanent or temporary condition that may prevent you from successfully completing the assessment event(s) in the way described, you should talk to your assessor about ‘reasonable adjustment’. This is the adjustment of the way you are assessed to take into account your condition, which must be approved BEFORE you attempt the assessment.

Assessment feedback, review or appeals

Appeals are addressed in accordance with Every Student’s Guide to Assessment in TAFE NSW.

Specific task instructions

The instructions and the criteria in the tasks and activities below will be used by the assessor to determine whether the tasks and activities have been satisfactorily completed. Use these instructions and criteria to ensure you demonstrate the required knowledge.

For Parts 1 to 3 of this assessment, use the Provide network systems administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1) to document your answers.

For both Part 2—Task 3 and Part 4—Task 1, you will use a virtual hard disk file called CentOS7-LinuxClass-VB to perform the tasks.

Preparation instructions

If you already have VirtualBox installed on your computer, you will not need to install it again.

  • Install VirtualBox:
    • Go to https://www.virtualbox.org/wiki/Downloads
    • Under VirtualBox platform packages, select Windows hosts or OS X hosts (depending on your operating system) to download the .exe file.
    • Install VirtualBox by double-clicking the VirtualBox package.
  • Create a virtual machine:
    • Watch Creating a new Virtual Machine (VM) in Virtual Box (Vimeo 9:00 min) and follow the steps in the video to create a virtual machine using the virtual hard disk file called CentOS7-LinuxClass-VB (in zip).
    • Login credentials are as follows:
      • Administrative account username: root
      • Password: rootpassword

Part 1: Manage software in a networked system

Document your answers in the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1) Part 1. Ensure you have cited all references (web links, books, etc.) in the Bibliography section of the above document.

  1. Refer to the BSA | The Software Alliance official website (www.bsa.org) to understand the legal and regulatory responsibilities in relation to security access and software. Based on this research, state five reasons why it is important to be a responsible software user.
  2. State three responsibilities of a systems administrator regarding copyright in an organisation.
  3. Refer to the Software asset management guide on the BSA website.
    1. Briefly outline in your own words, how you can keep an inventory of installed software in a networked system. (This process is also known as software auditing).

Your answer should include a minimum of 50 and no more than 85 words.

  1. List three questions you can answer to confirm understanding of an accurate software inventory.
  2. Briefly outline what information or material you need to collect regarding the software installed computers in a networked system.
  3. Briefly outline how you can determine what software is authorised or unauthorised (legal or illegal) in a networked system. Your answer should include a minimum of 50 and no more than 85 words.
  1. What is the best way of reporting to your manager if you found that certain users in your organisation are downloading illegal software? Select the appropriate form, channel and mode of communication for reporting the illegal software. Provide a sample of your communication in which you should include the following:
    1. Address the communication to the right person.
    2. State the situation.
    3. Explain the threat to the organisation.

Part 2: Record security access

Read the scenario given below to understand organisational requirements regarding client access requirements and clearance levels for different user groups.

Question 3 requires you to use screen capture software such as the snippet or snipping tool to take screenshots of the tasks you complete.

Scenario

North Sydney IT is an IT institute providing IT-related education to students both international and local. North Sydney IT, teaching section have different access levels for resources provided for different user groups, who are classified as students, teachers, managers and staff

Read the following security access guidelines given by management carefully.

Students

  • Can only view and copy resources from the shared folder: /nsit/learn
  • All students belong to their own user private group.
  • Students also belong to a secondary group called students

Teachers

  • Can view, copy, write and modify resources in the shared folder: /nsit/learn
  • Can view, copy, write and modify resources in the shared folder: /nsit/teach
  • Can only view and copy resources in the shared: /nsadmin/policies
  • All teachers belong to a primary group called teachers and a secondary group called staff

Head Teachers

  • Can view, copy, write and modify resources in the shared folder: /nsit/learn
  • Can view, copy, write and modify resources in the shared folder: /nsit/teach
  • Can view, copy, write and modify resources in the shared folder: /nsadmin/policies
  • All head teachers belong to a primary group called “teachers” two secondary groups called staff and management

Staff

  • All nsit employees including belong to the primary group called staff
  • All staff members should be able to access the shared folder: /nsadmin/policies

Administrator/super-user (root)

Systems administrator is responsible for creating and maintaining the following resources, thus he has the user ownership of all the following resources:

  • /nsit/learn
  • /nsit/teach
  • /nsadmin/policies

You are provided with some information about new students and new staff members at North Sydney IT. Obtain client access requirements ad clearance levels according to the scenario given.

Following are names of new students enrolled in courses

  • James Brown
  • Teresa Green
  • Mary White

Following are names of new teachers employed at North Sydney IT

  • Bob Martin
  • Sam Jenkins
  • Melany Triso

Following are names of new Head Teachers employed at North Sydney IT

  • Pete Evans
  • Tina Homes

All login names should be created in the following format

Example: if the client name is John Smith, the user login name should be jsmith

  1. Provide a summary of:
    • two general functions of an operating system
    • two networking features of an operating system
    • two basic features of Linux operating system used in the above scenario.

Document your answer in Part 2 of the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).

  1. Identify the primary and secondary group associations for all the new students, teachers and head-teachers in the scenario given. Document your answers in the table given in Part 2 of the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).
  1. Identify which user groups in North Sydney IT have access to which system resources. Document your answers in the sample template for a security access register given in Part 2 of Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1). The security access register must be maintained in line with the organisational guidelines provided in the scenario.
  2. Using the virtual machine that you set up at the beginning of the assessment, configure the user accounts, groups and resources given in the scenario and document the steps (take step-by-step screenshots). Follow the guidelines given below when performing this task. Record the commands that you used and include any screenshots from the system to support your answers.
  3. Create the new user accounts for students, teachers and head-teachers according to the scenario. Ensure the users’ full name is included in the comments field of the user account configuration file.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Set temporary passwords for the new user accounts created. Ensure that these temporary passwords are set to expire when the user logs into the system for the first time.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Create the necessary groups according to the scenario.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Add the users into the correct primary and secondary groups as documented in Question 1.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Create the following resources at the top of the directory structure:
  • /nsit/learn
  • /nsit/teach
  • /nsadmin/policies

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Configure the correct user and group ownerships for the above resources as identified in Question 2.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Configure the correct permissions for the system resources as identified in Question 2.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Login as one of the new student user accounts and test the system for correct functionality.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Login as one of the new teacher’s user accounts and test the system for correct functionality.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Login as one of the new head teacher’s user accounts and test the system for correct functionality.

Take screenshots of the above steps and paste them in the following table. When taking screenshots use a tool such as snippet and only take the part of the screen required.

  1. Using the scenario above, outline at least five guidelines and procedures all students and staff must follow with respect to security and network. This can include common measures around emails, storage devices, internet usage, etc.

Use the following table for your answer. Include images if required. (Approx. 100 words).

Part 3: Provide input into disaster recovery plan

Document your answers in Part 3 of the Provide system administration—Project report (Cl_SysAdmin_AE_Pro_1of2_SR1).

Ensure you have cited all references (web links and books, for example) in the bibliography section of the above document.

  1. Research different backup methods such as full backups, incremental backups and differential backups. Document your answers in the table given in Part 3, 1. Different backup methods in the Provide system administration—Project Report (Cl_SysAdmin_AE_Pro_1of2_SR1).
  2. Research organisational standards on labelling and storing backups and then:
    1. List five things you would include on a tape drive backup label.
    2. List three things you should consider when storing backups.
    3. List five things you can do to maintain records of backups.
  3. Research and describe five key elements that can be found in a typical IT disaster recovery policy.
  4. List three possible ways how you can communicate or publicise the disaster recovery plan to others as required.

Scenario

Assume that you are the systems administrator of your organisation. The information systems data is vital for your organisation to operate. You now need to decide on a disaster recovery plan concerning your organisations data.

Take into consideration that your organisation operates from Monday to Friday (from 9am – 5pm) and Saturday (9am – 3pm) every week. You are planning to use tape drives for taking backups.

Extracts from company backup rotation policy

Offsite tape rotation

Every Monday, the tapes from the weekend’s full backups are removed from the on-site tape library and stored in the off-site storage safe located in room 505 at the XYZ Building. Tapes stored off-site that are due to return to service are taken back to the data-centre for re-use.

Because the tapes may contain sensitive or restricted data, during transit to and from the off-site location, the courier may not make any stops or leave the tapes unattended at any time. The tape inventory log is updated to reflect the new location of tapes.

  1. Document your backup strategy/ schedule as part of your disaster recovery plan for the given scenario. Outline the following in your answer:
  • day of the week, the backup is taken
  • type of backup (full, incremental, differential)
  • time of backup
  • tape drive label and
  • storage location
  • restore details – state what is required for a system restore in case if a disaster occurs.
  1. Using the scenario, outline a backup service-level agreement (SLA) for the company. Describe the policies and procedures for deleting, restoring and archiving files. Consider the following and include in the SLA:
    • what will be backed up
    • regularity of the backup
    • response times for recovering data
    • whether you can recover all data
    • whether you can guarantee the reliability of data after a particular time
    • whether you can guarantee the latest copy of data
    • how users can contribute to a successful backup.

Part 4: Perform a backup and restore under supervision

Scenario

You are working for an IT company and have been assigned to implement a system backup and restore for a client.

Your first step is to meet with the supervisor to clarify requirements before starting each task. Book an appointment with your teacher to complete this step.

The meeting will be conducted using a web meeting platform such as Skype or Zoom. Your teacher will provide you with instructions on how to access the meeting and will take you through a few steps before you begin to enable you to turn on and adjust your microphone appropriately. Make sure the meeting is recorded.

You are also required to capture screenshots using the snipping tool, for each task you complete below for this assessment.

Refer to the checklists to see the skills that you need to demonstrate.

The first part of the checklist has the tasks that need to be performed. In this part you will demonstrate your skills in carrying out the required tasks.

The second part of the checklist assesses your oral communication skills demonstrated during the meeting role play with your client (teacher).

1.    Perform a backup and restore procedure using a test environment

Instructions:

Meeting role play (oral communication skills)

  • Before you begin each task, you must have a meeting with your client (teacher) to clarify the requirements of the task.
  • During the meeting make sure you:
    • Confirm the client’s requirements for the backup and restore.
    • Ask appropriate questions to clarify the task requirements.
    • Use clear and appropriate language including specific and relevant technical terms suitable for the client.
    • Use appropriate listening and questioning techniques to confirm understanding of the requirements of the task.

Demonstration task

  • Use the virtual machine you set up at the beginning of this assessment.
  • Use the snipping tool to take step-by-step screen shots of the demonstration tasks listed below. Ensure all screenshots capture the entire virtual machine window which shows the virtual machine name along with the date and time at the bottom.

Email task

  • When you have completed the tasks email your supervisor (teacher) to confirm that you have satisfactorily met the requirements.

Demonstration tasks

Task completed (Tick if done)

1.      Find out the total size of the class-files directory located at the top of the directory structure.

a.      What is the absolute pathname of class-files: _________________

b.      What is the size of the class-files directory____________

Include step-by-step screenshots of this activity here:

2.      Perform a backup of the class-files directory into the /backup directory.

To do this, create a compressed archive of class-files and all its contents.

The compressed archive should be named class-files.tar.bz2 and should be created inside the /backup directory.

Include step-by-step screenshots of this activity here:

3.      Check if the backup was created successfully in the /backup directory.

Include step-by-step screenshots of this activity here:

4.      Delete the original class-files directory including all its contents from the system.

Include step-by-step screenshots of this activity here:

5.      Restore the class-files directory to its original location.

Include step-by-step screenshots of this activity here:

6.      Check if the class-files directory was successfully restored.

a.      What is the total size of the class-files directory? ____________

b.      Is it the same as documented in Question 1a? ______________

Include step-by-step screenshots of this activity here:

Oral communication skills

Task completed (Tick if done)

7.      Ask questions to clarify task requirements with the client

8.      Uses listening and questioning techniques to confirm understanding

9.      Confirms task requirements with the client

10.  Articulates information clearly using specific and relevant technical language suitable to the client

2. Backup/Restore record

As per company guidelines, the form below needs to be filled out to record the completed restore.

Backup / Restore procedure

Date:

Test performed by:

Objects recovered:

Test performed in a test environment

YES  ☐

NO  ☐

Test result

Successful ☐

Unsuccessful ☐

Recommendations:

Want latest solution of this assignment