Assign1-SNA-Sibte
Assign1-SNA-Sibte
Assignment#1
Q#1. You are working with a Class B network with the private IP address of 172.16.0.0
/16. You need to maximize the number of broadcast domains, where each broadcast domain can
accommodate 1000 hosts. What subnet mask should you use?
ANSWER:
Q#2. How many subnets and hosts per subnet can you get from the network
192.168.200.0/29?
Q#3. How many subnets and host per subnet can you get from the network
172.21.0.0/23?
Q#4. What is the Network Address, broadcast address, first and last valid host address on the
following subnets?
a. 212.168.48.224/25
b. 222.168.48.214/26
c. 200.168.48.198/27
d. 192.168.48.178/29
e. 200.201.203.12/19
f. 172.16.255.47/22
g. 10.17.255.255/13
h. 10.19.255.255/14
Q#5: What key skills and relevant certifications are required to build a successful career as System
and Network Administrator?
Q#6:
A mid-sized software company with 500 employees face workstation management challenges
like inconsistent configurations, security vulnerabilities and lack of automation. How the IT
team can implement a solution involving
1. Hardware Standardization:
o Define a set of approved hardware models (e.g., laptops, desktops).
o Create hardware profiles based on user roles (e.g., developers, designers, admin
staff).
o Establish vendor relationships for bulk purchasing and warranty management.
2. OS and Image Standardization:
o Develop a golden image (master image) with a baseline OS and core applications.
o Maintain separate images for Windows, Linux, or macOS if required.
o Use Microsoft Deployment Toolkit (MDT) or Windows Autopilot for Windows
systems.
o Implement PXE boot for network-based OS deployment.
3. Image Deployment Automation:
o Use tools like:
Microsoft Endpoint Configuration Manager (MECM/SCCM) – Windows
imaging.
FOG Project – Open-source imaging for multi-OS support.
VMware Workspace ONE – Cross-platform endpoint management.
o Schedule regular image updates and version control to ensure consistency.
Security Enhancements
Enforce Multi-Factor Authentication (MFA) via tools like Okta or Azure AD.
Implement Role-Based Access Control (RBAC) for user permissions.
Use Privileged Access Management (PAM) for administrative accounts.
Deploy Security Information and Event Management (SIEM) systems (e.g., Splunk,
Microsoft Sentinel).
Set up automated alerts for suspicious activities.
Implement Network Access Control (NAC) to restrict unmanaged devices.
Create Endpoint Security Policies for data handling and user responsibilities.
Conduct regular security audits and vulnerability scans.
Train employees on cyber hygiene (e.g., phishing awareness).