NAME: NGUYEN QUANG TRUNG
ID: 201413693
CLASS: IT SOFTWARE
Providing Basic System Administration
Section 1. Introduction to Basic System Administration
Question 3. Which of the following are good password patterns?
a. 4 digits
b. 8 alpha characters
c. Surname backwards
d. 4 mixed alphanumeric characters
e. None of the above
f. (b) and (d)
Website generate password: https://strongpasswordgenerator.com/
https://identitysafe.norton.com/password-generator
http://www.techzoom.net/tools/password-generator.en
Question 4. What access attribute does a printer have?
A printer have write attribute
Question 5. Is a magnetic stripe entry access card an example of authentication or authorization?
Yes
Section 2. Providing Basic System Administration
Question 2. ManageSoft is a supplier of license tracking software. Research the company and their solutions and report on their license tracking software and what report it produces, what types of licenses it monitors, and what type of alerts it produces. (Hint: watch the live demonstration).
If you cannot locate information on this company, choose another and answer the same questions about their offering. Provide evidence.
Place all your research and findings in a report form, and present to your teacher/trainer for review and comment.
Company: ManageEngine
Website:http://www.manageengine.com/products/service-desk/software-license-tracking.html
Tracking software: MS Windows, MS Offices, …
What report it produces?
List of installed software
List of purchased license
List of review license
List of authorized software
Their license tracking:
What type of alerts it produces?
Software violation alert
Unauthorized software installation alert
Question 3. Research the SIIA’s website. List the three points of their mission statement.
Promote the Industry: SIIA promotes the common interests of the software and digital content industry as a whole, as well as its component parts.
Protect the Industry: SIIA protects the intellectual property of member companies, and advocates a legal and regulatory environment that benefits the entire industry.
Inform the Industry: SIIA informs the industry and the broader public by serving as a resource on trends, technologies, policies and related issues that affect member firms and demonstrate the contribution of the industry to the broader economy.
Question 4. Define the concept of concurrent users in respect to software licensing.
Many software products are licensed based on how many users access the software simultaneously. For example Microsoft Office might be licensed for 500 concurrent users. Advantageous when even though there may be 2000 employees that might use MS Office it might be deemed unlikely that more than 500 will be active at any one point in time.
Question 5. What is a “dongle”?
A mechanism for ensuring that only authorized users can copy or use specific software applications. Usually used for very expensive programs. Common mechanisms include a hardware key that plugs into a port or USB slot on a computer and that a software application accesses for verification before executing.
It is also a small piece of hardware that attaches to computer, TV, or other electronic device, and that, when attached, enables additional functions such as copy protection, audio, video, games, data, or other services
Question 6: Choose what license tracking is desirable for:
a. Keeping track of renewal dates
b. Detecting pirate software
c. Controlling costs
d. Authentication
e. All of the above
f. (a), (b), (c)
Section 3. System Back Up and Restore
Question 2. Interview two IT managers in two separate companies. Tell them you are doing a research project. Ask them to describe their system recovery plans with you, and ask them if there were any instances where this plan was implemented, and what the cause was.
Thank them for their time.
Put your findings in a report form and present to your teacher/trainer for review and comment.
Name: NGUYEN THE VINH
Organization: NAMDINH UNIVERSITY OF TECHNICAL EDUCATION
Recovery plan:
Manual
Terminal
Backup: When there is a change in the operating system or application software and restore When an error
Backup: Operating system, application software, Data,…
Restore: Operating system, application software, Data,…
Question 3. What is the grandfather/father/son method?
Grandfather-father-son backup refers to a common rotation scheme for backup media. In this scheme there are three or more backup cycles, such as daily, weekly and monthly. The daily backups are rotated on a daily basis using a FIFO system as above. The weekly backups are similarly rotated on a weekly basis, and the monthly backup on a monthly basis. In addition, quarterly, half-yearly, and/or annual backups could also be separately retained. Often some of these backups are removed from the site for safekeeping and disaster recovery purposes
Question 4. What is meant by the term data integrity?
The term data integrity is broad in scope and may have widely different meanings depending on the specific context – even under the same general umbrela of computing. This article provides only a broad overview of some of the different types and concerns of data integrity.
- Data integrity is the opposite of data corruption, which is a form of data loss. The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended (such as a database correctly rejecting mutually exclusive possibilities,) and upon later retrieval, ensure the data is the same as it was when it was originally recorded. In short, data integrity aims to prevent unintentional changes to information. Data integrity is not to be confused with data security, the discipline of protecting data from unauthorized parties.
Question 5. Differential backup is a valid backup method. True or false?
True
Question 6. Valid techniques in backup data manipulation include:
a. De-duplication (True)
b. Compression (True)
c. Encryption (True)
Section 4. Networks and Network Hardware
Question 1.
Name: NGUYEN THE VINH
Organization: NAMDINH UNIVERSITY OF TECHNICAL EDUCATION
Location: Phu Nghia Street, Ngoc Hai District, Nam Dinh city
How many computers/users are connected to their LAN?
200 computers
Do they have an IT department that manages the LAN?
Yes
If not, do they have an outside consultant/contractor manage their LAN?
Question 2: As a review in your own words what is the meaning of the following terms:
Node: a node (Latin nodus, ‘knot’) is either a connection point, a redistribution point or a communication endpoint (some terminal equipment). The definition of a node depends on the network and protocol layer referred to. A physical network node is an active electronic device that is attached to a network, and is capable of sending, receiving, or forwarding information over a communications channel. A passive distribution point such as a distribution frame or patch panel is consequently not a node.
Topology: The word topology in computer networking means the schematic layout of a network. In other words the way the computers are connected to each other when it is drawn out. When speaking about network topology, any computer or communication device connected to a network is called a ‘node’.
There are four standard types of network topologies:
The Star Network
The Ring Network
The Bus Network
The Tree Network
Schematic: A schematic, or schematic diagram, is a representation of the elements of a system using abstract, graphic symbols rather than realistic pictures. A schematic usually omits all details that are not relevant to the information the schematic is intended to convey, and may add unrealistic elements that aid comprehension
Backbone: A backbone network or network backbone is a part of computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or sub networks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than the networks connected to it
LAN: A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media.
WAN: A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.
Question 3: The protocol standard ‘Open Systems Interconnection’ (OSI) has a substantial influence on how networks are set up especially how network devices communication between themselves and other networks.
As we mentioned the model is based on seven layers, each layer specifying a specific network function. This activity requires you to research and draw out in a graphical form those layers.
Show your activity to your teacher/trainer for review and comment.
Question 4: There are many examples of businesses using an extranet. Research and find three extranets.
- Manufacturing. From airlines to automobiles, the manufacturing industry uses extranets to provide access to product manuals and technical specifications. Extranets make it easy to share and transfer this type of information, which can run to thousands of pages in print format. Also, those with access can update information, flag problems and issue warnings all instantly, in a self-serve format.
- Financial services. Banks, brokerages and other institutions use extranets to perform a variety of transactions, covering everything from consumer banking to check-clearing services. Even the Internal Revenue Service has developed an extranet that allows tax-processing companies to submit forms over the Internet.
- On