Assessment Activity: Build and Configure Servers
ICTNWK540 - Design, build and test network servers
Instructions: The assessment activities in this workbook are based on a simulated company,
SS Tech Pvt Ltd, a leading technology solutions provider specializing in software development,
IT consulting, and network infrastructure services. Learners are expected to carefully review
the provided scenarios, general instructions, learner instructions, and checklists to fully
understand and complete the assessment activities. The simulation is designed to reflect real-
world IT infrastructure projects, requiring learners to apply their technical skills in a structured
manner. By engaging in these activities, learners will gain hands-on experience in designing,
implementing, and managing network servers while following industry best practices.
Overview: SS Tech Pvt Ltd is a fast-growing technology solutions provider that specializes
in software development, IT consulting, and network infrastructure services. Headquartered in
Bangalore, India, the company operates multiple branch offices and serves clients across
various industries, including finance, healthcare, e-commerce, and telecommunications.
To support its expansion, SS Tech Pvt Ltd is enhancing its IT infrastructure to meet rising
business demands, strengthen network security, and boost operational efficiency. The company
plans to develop and configure new network servers to facilitate internal operations, client-
based applications, and cloud services. For this initiative, the IT department has been entrusted
with the responsibility of designing, deploying, and securing the upgraded server infrastructure.
This involves selecting suitable server hardware, installing and configuring network operating
systems, enforcing security measures, and establishing disaster recovery protocols.
Additionally, the company is integrating automation and monitoring tools to optimize server
performance, minimize downtime, and enhance cybersecurity. By implementing these
improvements, SS Tech Pvt Ltd aims to build a robust, secure, and high-performance IT
infrastructure that aligns with industry best practices and regulatory standards. This initiative
will not only enhance operational efficiency but also enable the company to deliver seamless,
secure, and scalable technology solutions to its clients worldwide. With a future-ready IT
ecosystem, SS Tech Pvt Ltd is well-positioned to drive innovation, improve service delivery,
and maintain a competitive edge in the global technology market.
1
Organisational Chart:
Roles & Responsibilities:
1. President - IT Services
Oversees the entire IT services department, ensuring alignment with business goals.
Responsible for making high-level strategic decisions regarding technology
investments and innovations.
2. Vice President - IT Services
Assists the President in managing IT operations and driving digital transformation
initiatives.
Ensures smooth coordination between different IT departments and resolves major
technical challenges.
3. IT Technologies
Focuses on managing and developing IT systems, ensuring technological advancements
align with business needs.
Responsible for infrastructure planning, hardware/software management, and
cybersecurity strategies.
2
Roles under IT Technologies:
a) Director of IT Technologies
Leads IT strategy, infrastructure development, and system integration efforts.
Ensures IT compliance with security policies, best practices, and regulatory standards.
b) Senior Support Specialist (SIS)
Provides advanced technical support and troubleshooting for complex IT issues.
Assists in training and mentoring junior IT staff on technical processes.
c) IT Solutions Architect
Designs scalable and efficient IT solutions that meet business objectives.
Evaluates and implements emerging technologies to enhance operational efficiency.
4. Proactive Services
Focuses on IT support and preventive measures to ensure business continuity.
Implements proactive monitoring and maintenance to prevent system failures.
Roles under Proactive Services:
a) Proactive Services Manager
Manages the team responsible for preventive IT maintenance and support.
Develops strategies for system monitoring, troubleshooting, and optimization.
b) Proactive Services Team
Provides continuous IT support and ensures minimal downtime.
Conducts regular system audits and applies necessary upgrades or patches.
5. Project Management
Handles IT projects, from planning to execution, ensuring timely delivery.
Coordinates with multiple teams to implement new IT solutions efficiently.
Roles under Project Management:
a) IT Project Managers
Plans, manages, and monitors IT projects, ensuring they meet business needs.
Allocates resources, manages risks, and ensures projects stay within budget.
b) Project Team (Implementers)
Implements IT solutions, including software installations and system configurations.
Collaborates with different departments to ensure smooth project execution.
3
6. Client CIO (Chief Information Officer)
Acts as a bridge between IT and business operations to align technology with company
objectives.
Makes key decisions regarding IT investments, data management, and digital
transformation.
Roles under Client CIO:
a) IT Support Manager
Oversees IT support teams and ensures high-quality technical assistance to users.
Develops IT support policies, procedures, and service-level agreements.
b) Support Specialist
Provides troubleshooting and technical assistance to resolve IT issues.
Assists in software installations, updates, and security configurations.
c) IT Consultant
Advises clients and internal teams on IT strategies, solutions, and best practices.
Helps optimize IT operations and ensures technology aligns with business goals.
d) Help Desk Consultant
Manages customer queries and provides first-level IT support.
Assists with system access issues, software troubleshooting, and user guidance.
e) Help Desk Services
Provides 24/7 IT support for employees and clients to resolve technical issues.
Tracks and documents IT incidents to improve future problem resolution.
Scenario: Server Deployment and Configuration at SS Tech Pvt Ltd
I’m Shivam, the Senior Support Specialist (SIS) at SS Tech Pvt Ltd, a leading technology
solutions provider. The company is expanding its operations and requires a new network
server infrastructure to be designed, built, and configured to support internal operations and
client-based applications.
As part of my role, i have been assigned the responsibility of leading the network server
deployment for the company. My team includes:
Amit (IT Solutions Architect) – responsible for designing the IT infrastructure.
Neha (Project Team - Implementer) – responsible for implementing configurations
and testing.
4
The Vice President of IT Services has provided key objectives for the server deployment:
1. Install the network operating system and necessary software.
2. Implement security measures, ensuring only authorized access.
3. Configure and test network services, including backup and disaster recovery
solutions.
My task is to lead the project, coordinate with Amit and Neha, and ensure the successful
deployment of the network servers while following industry best practices. I need to
document the installation, configuration, and security implementations to ensure compliance
with company policies and regulatory standards.
My discussion with Amit and Neha should include:
The server installation process, including selecting the appropriate network
operating system.
Security patches and updates to mitigate potential risks.
Configuring automatic updates and backup strategies for disaster recovery.
Ensuring network connectivity and optimizing performance.
Required Documents and Equipment
Documents:
1. Network Design Specifications Document (Provided by Amit).
2. Work Health and Safety (WHS) Procedures.
3. Security Policy and Patch Management Guidelines.
4. Backup and Recovery Procedures.
5. Roles and Responsibilities Document.
Equipment:
1. Server machine (physical or virtual).
2. Network operating system installation media (e.g., Windows Server or Linux).
3. Additional tools and third-party software (e.g., antivirus, backup tools).
4. Security patches and system updates.
5. Backup and recovery tools.
6. Internet connectivity for downloading updates.
7. System monitoring tools (e.g., Nagios, PRTG, or Zabbix).
8. User and administrative access credentials.
General Instructions:
5
Review the Scenario and Organizational Requirements Carefully
Familiarize yourself with the network design specifications and infrastructure
requirements provided by SS Tech Pvt Ltd.
Understand the key objectives set by the Vice President of IT Services to ensure
alignment with company policies.
Follow Each Step in Sequence to Ensure Compliance with Design and Security
Requirements
Proceed systematically through each phase of the network server setup, ensuring that
security configurations, network services, and disaster recovery protocols are
implemented correctly.
Double-check compatibility between software, hardware, and network configurations
to avoid potential issues.
Document All Steps, Including Configurations, Troubleshooting Actions, and Test Results
Maintain detailed documentation of the installation and configuration process,
including system logs, screenshots, and configuration settings.
Record any troubleshooting actions taken to resolve errors, ensuring future reference
for maintenance and improvements.
Collaborate with Amit and Neha to Resolve Any Issues During Deployment
Work closely with the IT Solutions Architect (Amit) to ensure that the server
infrastructure meets the company’s scalability and performance requirements.
Coordinate with Neha (Project Team - Implementer) to test and validate the
configurations, ensuring functionality and security compliance.
Engage in discussions to troubleshoot technical challenges and implement solutions
effectively.
Ensure All Security Protocols and WHS (Work Health and Safety) Procedures Are
Followed
Implement security measures to protect the servers from unauthorized access and cyber
threats.
Apply necessary WHS procedures, including safe handling of hardware, proper cable
management, and adherence to ergonomic best practices while working in a computer
lab or data center environment.
Submit a Detailed Report of the Completed Setup, Including Screenshots and Logs
Compile a structured report containing all documented configurations, security
implementations, backup procedures, and network connectivity tests.
Provide screenshots of critical steps, such as OS installation, firewall configuration, and
successful backup/restore operations.
6
Ensure the report is formatted professionally and includes a summary of key takeaways
and lessons learned from the deployment process.
Instructions for Learners
Step 1: Install Network Operating System (PC 3.1)
🔹 Shivam: Amit, what factors should we consider while selecting the network operating
system for our new servers?
🔹 Amit: We need to choose an OS that meets our performance, security, and scalability
requirements. Based on our design, we can go with either Windows Server or a Linux-based
system.
🔹 Shivam: Once we finalize the OS, what’s the process for installation?
🔹 Neha: First, we boot the server using the installation media. Then, we follow the setup
wizard, partition the drives as needed, and configure initial settings like hostname, IP address,
and domain membership.
🔹 Shivam: Good. Make sure we document each step, including screenshots of configurations.
Step 2: Install Additional Tools and Third-Party Software (PC 3.2)
🔹 Shivam: Neha, what software do we need to install after setting up the operating system?
🔹 Neha: We’ll install essential third-party tools like antivirus software, backup utilities, and
monitoring tools such as Nagios or PRTG.
🔹 Shivam: Amit, how do we ensure that these tools integrate well with our network?
🔹 Amit: We should check compatibility before installation, ensure proper configurations, and
perform functionality tests after deployment.
🔹 Shivam: Great. Document the installation steps and test results.
Step 3: Implement Security Design and Patch Operating System (PC 3.3)
7
🔹 Shivam: Security is a top priority. Amit, how should we handle security patches and
updates?
🔹 Amit: We need to apply the latest security patches to both the OS and installed applications.
This will help mitigate vulnerabilities.
🔹 Shivam: What about firewall configurations?
🔹 Neha: We’ll configure firewall settings to restrict unauthorized access while allowing
necessary services. Additionally, we should enable an intrusion detection/prevention system.
🔹 Shivam: Good. Let’s make sure that all security configurations are thoroughly tested.
Step 4: Configure Network Services and Restore Local Data (PC 3.4)
🔹 Shivam: Amit, what network services need to be configured on the server?
🔹 Amit: We’ll need to set up DHCP for IP allocation and DNS for domain name resolution,
ensuring they align with the company’s network design.
🔹 Shivam: Neha, how do we restore the local data?
🔹 Neha: We’ll use the provided backup to restore files and user profiles. Once restored, we’ll
verify data integrity.
🔹 Shivam: Excellent. Keep logs of the restoration process.
Step 5: Implement Security Design to Prevent Unauthorized Access (PC 3.5)
🔹 Shivam: We need to enforce strict access control. Neha, what measures should we
implement?
🔹 Neha: We’ll set up user access controls with role-based permissions to ensure only
authorized users can access critical resources.
🔹 Shivam: Amit, how can we protect sensitive data?
8
🔹 Amit: We should enable encryption for data at rest and in transit to prevent unauthorized
access or data breaches.
🔹 Shivam: Good. Let’s ensure compliance with company policies.
Step 6: Reconnect and Reconfigure Connectivity Devices (PC 3.6)
🔹 Shivam: Neha, what steps are involved in reconnecting the server to the network?
🔹 Neha: We’ll physically reconnect the server to the network and configure connectivity
devices such as routers and switches.
🔹 Shivam: Amit, how do we ensure seamless communication between the new server and
existing network components?
🔹 Amit: We should check device configurations, update firmware if needed, and perform
network tests to identify and resolve connectivity issues.
🔹 Shivam: Good. Let’s conduct a thorough test and document the results.
Step 7: Configure Update Services (PC 3.7)
🔹 Shivam: Amit, why is it important to enable automatic updates?
🔹 Amit: Automatic updates ensure that the system stays protected against new vulnerabilities
and performance issues.
🔹 Shivam: Neha, how do we configure update services?
🔹 Neha: We’ll enable Windows Update or Linux package management tools and configure
policies to install critical patches automatically.
🔹 Shivam: Great. Run a test update to verify the setup.
Step 8: Restore Local Data to New Server (PC 3.8)
🔹 Shivam: Amit, after installing updates, how do we ensure that restored data is intact?
🔹 Amit: We need to check file integrity, compare restored data with original backups, and
verify access permissions.
🔹 Shivam: Neha, what if there are missing or corrupted files?
🔹 Neha: In that case, we should attempt a second restoration and troubleshoot any data
corruption issues.
🔹 Shivam: Good. Let’s document all test results.
Step 9: Implement Backup and Recovery Methods (PC 3.9)
🔹 Shivam: Backup and disaster recovery are crucial. Amit, what backup solution do you
recommend?
9
🔹 Amit: We should implement a combination of full, incremental, and offsite backups to
ensure data safety.
🔹 Shivam: Neha, how do we test our backup system?
🔹 Neha: We simulate a disaster scenario, delete a test file, and attempt to restore it from the
backup. If successful, the backup system is working correctly.
🔹 Shivam: Excellent. Keep a log of the backup tests and restoration attempts.
Instructions for assessor(s):
Role-Play Characters
Assessor (Playing the Role of VP of IT Services)
Shivam (Learner - Senior Support Specialist, SIS)
Amit (Played by Assessor/College Staff - IT Solutions Architect)
Neha (Played by Assessor/College Staff - Project Implementer)
Before the Activity:
🔹 Assessor: Set up a simulated IT workshop environment where the learner will lead a
discussion on server deployment. The assessor will act as the VP of IT Services, evaluating
Shivam’s performance, while college staff will play Amit (Architect) and Neha
(Implementer).
During the Activity:
Step 1: Install Network Operating System (PC 3.1)
🔹 Assessor: Shivam, can you walk us through the process of installing the network operating
system?
🔹 Shivam: Sure! We start by booting the server using the installation media, then follow the
setup wizard to install the OS as per the design specifications provided by Amit. We also
configure basic settings like hostname, IP address, and domain membership.
🔹 Assessor: Did you ensure that the installation was properly documented?
🔹 Shivam: Yes, I took screenshots of each configuration step and logged the installation
details.
Observation: The learner correctly installed the OS and documented the process.
Step 2: Install Additional Tools and Third-Party Software (PC 3.2)
🔹 Assessor: Amit, what additional software is required on the new server?
10
🔹 Amit: We need antivirus, backup tools, and network monitoring software like PRTG or
Nagios.
🔹 Assessor: Shivam, did you install and verify these tools?
🔹 Shivam: Yes, after installation, I tested each tool to ensure they function properly.
Observation: The learner correctly installed and tested third-party tools.
Step 3: Implement Security Design and Patch Operating System (PC 3.3)
🔹 Assessor: Neha, what security patches and updates did you apply?
🔹 Neha: We installed all available OS updates and security patches to eliminate
vulnerabilities.
🔹 Assessor: Shivam, what firewall and security measures did you configure?
🔹 Shivam: I configured firewall rules to allow only necessary traffic and enabled an intrusion
detection system.
Observation: The learner successfully applied security patches and configured firewall
settings.
Step 4: Configure Network Services and Restore Local Data (PC 3.4)
🔹 Assessor: Amit, which network services did you implement?
🔹 Amit: We configured DHCP for dynamic IP allocation and DNS for domain name
resolution.
🔹 Assessor: Shivam, how did you restore local data to the new server?
🔹 Shivam: I used the provided backup to restore data and verified its integrity.
Observation: The learner configured network services and successfully restored data.
Step 5: Implement Security Design to Prevent Unauthorized Access (PC 3.5)
🔹 Assessor: Shivam, how did you configure access control?
🔹 Shivam: I implemented role-based access control (RBAC) and assigned permissions based
on user roles.
🔹 Assessor: Amit, what encryption methods did you use for sensitive data?
🔹 Amit: We enabled full-disk encryption and encrypted data transmissions.
Observation: The learner correctly implemented access control and encryption.
Step 6: Reconnect and Reconfigure Connectivity Devices (PC 3.6)
🔹 Assessor: Neha, what steps did you take to reconnect the server to the network?
11
🔹 Neha: We reconnected the server using configured routers and switches and tested
connectivity.
🔹 Assessor: Shivam, did you verify network performance after reconfiguration?
🔹 Shivam: Yes, we ran network diagnostics to confirm stable connectivity.
Observation: The learner successfully reconnected the server and optimized network
performance.
Step 7: Configure Update Services (PC 3.7)
🔹 Assessor: Amit, why is automatic updating important?
🔹 Amit: It ensures the OS and applications stay secure and up to date.
🔹 Assessor: Shivam, how did you configure update services?
🔹 Shivam: I enabled Windows Update/Linux package manager and scheduled automatic
updates.
Observation: The learner correctly set up automatic updates.
Step 8: Restore Local Data to New Server (PC 3.8)
🔹 Assessor: Neha, how did you verify that the restored data was intact?
🔹 Neha: We compared the restored files with the original backup and checked access
permissions.
🔹 Assessor: Shivam, did you face any issues during restoration?
🔹 Shivam: No, the restoration was successful, and all data was accessible.
Observation: The learner successfully restored and validated data.
Step 9: Implement Backup and Recovery Methods (PC 3.9)
🔹 Assessor: Amit, what backup strategy was implemented?
🔹 Amit: We used a combination of full, incremental, and offsite backups.
12
🔹 Assessor: Shivam, how did you test disaster recovery?
🔹 Shivam: We simulated a data loss scenario, restored files from backup, and verified
recovery success.
Observation: The learner implemented and tested backup and recovery methods.
Feedback and Marking:
🔹 Assessor: Overall, the server deployment was well-executed. What challenges did you
face?
🔹 Shivam: Some minor connectivity issues, but they were resolved after troubleshooting.
🔹 Assessor: Excellent work. I’ll provide a performance report with suggestions for
improvement.
13