Question 3
a) I have no need for security management functions because I am using a dedicated and secure management network. Please comment on this statement
AP,5
2
b) Performance and accounting management are similar, in that both are interested in collecting usage data from the network. Describe an important way in which the use of this data and the requirements for its
AN,10
c)A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. What should an
administrator implement to prevent future outbreaks?
Question 2
a) Explain two factors that can be important to the business success of a third-party
management application vendor that potentially has to compete with a network management offering of a network equipment vendor
AP,5
b) Explain the most important reason for using a dedicated management network instead of a shared one?
Assume that you need to manage a network that contains three different types of
devices. To avoid dependence on a particular vendor, you have two suppliers for each
type of device. Explain some of the ways in which management standards are
important in this situation.
c)
AN,10
AP,10
TOTAL[
Question 1
a) A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Explain the protocol needed to be configured on each network device to provide that information in a secure manner AP,5
b) A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which policy should the IT security team implement to help protect the network from attack as a result of this new policy
c)
Explain why a management protocol needed between managers and agents, and why
isn't mere connectivity between them sufficient?
Question 1 (a) Assemble a Server computer based on your budget (state the amount in Ghana Cedis), discussing the type of components (giving their exact names, model numbers, types, cost, architecture, etc.) you would need and give reasons why you need them.
(b) Discuss how you would network AIT-Sea View campus, taking into account the various sections of that campus (computer labs, health clinic, offices, security post, etc), discussing the choice of technologies, devices, topology/topologies, network types, protocols and anything else you would use and justifying your choices.
(c) Discuss a simple networked system that could be used at the entrance to an examination hall at AIT in order to eliminate the manual checking of examination chits and ID cards during an exam session. Assemble such a system and discuss all the components of the system and how they function in detail.
Question 3
a) I have no need for security management functions because I am using a dedicated and secure management network. Please comment on this statement
b) Performance and accounting management are similar, in that both are interested in collecting usage data from the network. Describe an important way in which the use of this data and the requirements for its collection differ.
c)A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. What should an
administrator implement to prevent future outbreaks?
Question 2
a) Explain two factors that can be important to the business success of a third-party
management application vendor that potentially has to compete with a network management offering of a network equipment vendor
b) Explain the most important reason for using a dedicated management network instead of a shared one?
c) Assume that you need to manage a network that contains three different types of
devices. To avoid dependence on a particular vendor, you have two suppliers for each
type of device. Explain some of the ways in which management standards are
important in this situation.
Question 1
a) A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Explain the protocol needed to be configured on each network device to provide that information in a secure manner
b) A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which policy should the IT security team implement to help protect the network from attack as a result of this new policy
c)
Explain why a management protocol needed between managers and agents, and why
isn't mere connectivity between them sufficient?
Question 4
a)
As a network administrator, design a network diagram for an organization having six
offices in in a different region making sure that users can access all the organization’s network
b) A technician wants to securely manage several remote network devices. Explain what
should be implemented to securely manage the devices?
c) After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Explain what should the technician perform so that Ann can get back to work as quickly as possible?
• What is deadlock? What is starvation? How do they differ from each other?
) Compare the two policies and then create a policy you believe would be fair to you as a student of RGI. Include guidelines for Internet use during school hours, breaks, use of smartphones, and restrictions for using social media and unauthorized websites
(a) Locate two AUPs, one from the internet (published online) and the second one should be for your institution (Richfield Graduate Institute of Technology?